Virus 2FA Data Privacy Denial of Service (DOS) VPN Exploit Security breach Cyber intelligence PII Vulnerability Trojan Hacker Identity theft Encryption Spam Password Phishing Network monitoring Patch Digital Certificate Penetration testing Firewall Rootkit Keylogger Incident response Man-in- the- middle attack IT Security Program Ransomware Security posture MFA Cybersecurity insurance Cyberbullying Cybersecurity awareness Crowdstrike Backdoor Zero- day exploit Virus 2FA Data Privacy Denial of Service (DOS) VPN Exploit Security breach Cyber intelligence PII Vulnerability Trojan Hacker Identity theft Encryption Spam Password Phishing Network monitoring Patch Digital Certificate Penetration testing Firewall Rootkit Keylogger Incident response Man-in- the- middle attack IT Security Program Ransomware Security posture MFA Cybersecurity insurance Cyberbullying Cybersecurity awareness Crowdstrike Backdoor Zero- day exploit
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Virus
2FA
Data Privacy
Denial of Service (DOS)
VPN
Exploit
Security breach
Cyber intelligence
PII
Vulnerability
Trojan
Hacker
Identity theft
Encryption
Spam
Password
Phishing
Network monitoring
Patch
Digital Certificate
Penetration testing
Firewall
Rootkit
Keylogger
Incident response
Man-in-the-middle attack
IT Security Program
Ransomware
Security posture
MFA
Cybersecurity insurance
Cyberbullying
Cybersecurity awareness
Crowdstrike
Backdoor
Zero-day exploit