Incident Response (IR) Zero- Day Exploit Cyber Threat Intelligence (CTI) Firewall Endpoint Security Cryptography Virtual Private Network (VPN) Public Key Infrastructure (PKI) Malware Threat Patch Data Loss Prevention (DLP) Ransomware Antivirus Penetration Testing Encryption Botnet Intrusion Detection System (IDS) Social Engineering Two-Factor Authentication (2FA) Data Breach Phishing Vulnerability Denial of Service (DoS) Attack Access Control Incident Response (IR) Zero- Day Exploit Cyber Threat Intelligence (CTI) Firewall Endpoint Security Cryptography Virtual Private Network (VPN) Public Key Infrastructure (PKI) Malware Threat Patch Data Loss Prevention (DLP) Ransomware Antivirus Penetration Testing Encryption Botnet Intrusion Detection System (IDS) Social Engineering Two-Factor Authentication (2FA) Data Breach Phishing Vulnerability Denial of Service (DoS) Attack Access Control
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Incident Response (IR)
Zero-Day Exploit
Cyber Threat Intelligence (CTI)
Firewall
Endpoint Security
Cryptography
Virtual Private Network (VPN)
Public Key Infrastructure (PKI)
Malware
Threat
Patch
Data Loss Prevention (DLP)
Ransomware
Antivirus
Penetration Testing
Encryption
Botnet
Intrusion Detection System (IDS)
Social Engineering
Two-Factor Authentication (2FA)
Data Breach
Phishing
Vulnerability
Denial of Service (DoS) Attack
Access Control