VPN 2FA IT Security Program Trojan Zero- day exploit Cyber intelligence Network monitoring Password Cybersecurity awareness Incident response Hacker Cybersecurity insurance Denial of Service (DOS) Ransomware Spam Keylogger Security breach Phishing PII Patch Identity theft MFA Vulnerability Exploit Data Privacy Security posture Backdoor Virus Rootkit Firewall Man-in- the- middle attack Digital Certificate Crowdstrike Encryption Cyberbullying Penetration testing VPN 2FA IT Security Program Trojan Zero- day exploit Cyber intelligence Network monitoring Password Cybersecurity awareness Incident response Hacker Cybersecurity insurance Denial of Service (DOS) Ransomware Spam Keylogger Security breach Phishing PII Patch Identity theft MFA Vulnerability Exploit Data Privacy Security posture Backdoor Virus Rootkit Firewall Man-in- the- middle attack Digital Certificate Crowdstrike Encryption Cyberbullying Penetration testing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
VPN
2FA
IT Security Program
Trojan
Zero-day exploit
Cyber intelligence
Network monitoring
Password
Cybersecurity awareness
Incident response
Hacker
Cybersecurity insurance
Denial of Service (DOS)
Ransomware
Spam
Keylogger
Security breach
Phishing
PII
Patch
Identity theft
MFA
Vulnerability
Exploit
Data Privacy
Security posture
Backdoor
Virus
Rootkit
Firewall
Man-in-the-middle attack
Digital Certificate
Crowdstrike
Encryption
Cyberbullying
Penetration testing