Phishing Two-Factor Authentication (2FA) Vulnerability Threat Firewall Access Control Botnet Antivirus Malware Data Loss Prevention (DLP) Incident Response (IR) Encryption Endpoint Security Cyber Threat Intelligence (CTI) Patch Denial of Service (DoS) Attack Public Key Infrastructure (PKI) Data Breach Penetration Testing Zero- Day Exploit Virtual Private Network (VPN) Ransomware Social Engineering Intrusion Detection System (IDS) Cryptography Phishing Two-Factor Authentication (2FA) Vulnerability Threat Firewall Access Control Botnet Antivirus Malware Data Loss Prevention (DLP) Incident Response (IR) Encryption Endpoint Security Cyber Threat Intelligence (CTI) Patch Denial of Service (DoS) Attack Public Key Infrastructure (PKI) Data Breach Penetration Testing Zero- Day Exploit Virtual Private Network (VPN) Ransomware Social Engineering Intrusion Detection System (IDS) Cryptography
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Phishing
Two-Factor Authentication (2FA)
Vulnerability
Threat
Firewall
Access Control
Botnet
Antivirus
Malware
Data Loss Prevention (DLP)
Incident Response (IR)
Encryption
Endpoint Security
Cyber Threat Intelligence (CTI)
Patch
Denial of Service (DoS) Attack
Public Key Infrastructure (PKI)
Data Breach
Penetration Testing
Zero-Day Exploit
Virtual Private Network (VPN)
Ransomware
Social Engineering
Intrusion Detection System (IDS)
Cryptography