Cyber intelligence Cyberbullying 2FA Backdoor Exploit Encryption Firewall Phishing Password Zero- day exploit Virus VPN Penetration testing PII Rootkit MFA IT Security Program Spam Denial of Service (DOS) Hacker Security posture Crowdstrike Digital Certificate Network monitoring Vulnerability Man-in- the- middle attack Security breach Cybersecurity awareness Identity theft Ransomware Trojan Keylogger Cybersecurity insurance Data Privacy Incident response Patch Cyber intelligence Cyberbullying 2FA Backdoor Exploit Encryption Firewall Phishing Password Zero- day exploit Virus VPN Penetration testing PII Rootkit MFA IT Security Program Spam Denial of Service (DOS) Hacker Security posture Crowdstrike Digital Certificate Network monitoring Vulnerability Man-in- the- middle attack Security breach Cybersecurity awareness Identity theft Ransomware Trojan Keylogger Cybersecurity insurance Data Privacy Incident response Patch
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cyber intelligence
Cyberbullying
2FA
Backdoor
Exploit
Encryption
Firewall
Phishing
Password
Zero-day exploit
Virus
VPN
Penetration testing
PII
Rootkit
MFA
IT Security Program
Spam
Denial of Service (DOS)
Hacker
Security posture
Crowdstrike
Digital Certificate
Network monitoring
Vulnerability
Man-in-the-middle attack
Security breach
Cybersecurity awareness
Identity theft
Ransomware
Trojan
Keylogger
Cybersecurity insurance
Data Privacy
Incident response
Patch