Botnet Access Control Data Loss Prevention (DLP) Cyber Threat Intelligence (CTI) Virtual Private Network (VPN) Ransomware Encryption Patch Intrusion Detection System (IDS) Penetration Testing Threat Denial of Service (DoS) Attack Vulnerability Zero- Day Exploit Malware Cryptography Antivirus Social Engineering Incident Response (IR) Data Breach Two-Factor Authentication (2FA) Phishing Endpoint Security Firewall Public Key Infrastructure (PKI) Botnet Access Control Data Loss Prevention (DLP) Cyber Threat Intelligence (CTI) Virtual Private Network (VPN) Ransomware Encryption Patch Intrusion Detection System (IDS) Penetration Testing Threat Denial of Service (DoS) Attack Vulnerability Zero- Day Exploit Malware Cryptography Antivirus Social Engineering Incident Response (IR) Data Breach Two-Factor Authentication (2FA) Phishing Endpoint Security Firewall Public Key Infrastructure (PKI)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Botnet
Access Control
Data Loss Prevention (DLP)
Cyber Threat Intelligence (CTI)
Virtual Private Network (VPN)
Ransomware
Encryption
Patch
Intrusion Detection System (IDS)
Penetration Testing
Threat
Denial of Service (DoS) Attack
Vulnerability
Zero-Day Exploit
Malware
Cryptography
Antivirus
Social Engineering
Incident Response (IR)
Data Breach
Two-Factor Authentication (2FA)
Phishing
Endpoint Security
Firewall
Public Key Infrastructure (PKI)