Patch Zero- Day Exploit Endpoint Security Ransomware Access Control Denial of Service (DoS) Attack Intrusion Detection System (IDS) Public Key Infrastructure (PKI) Cyber Threat Intelligence (CTI) Antivirus Vulnerability Incident Response (IR) Penetration Testing Malware Encryption Data Breach Two-Factor Authentication (2FA) Botnet Virtual Private Network (VPN) Cryptography Phishing Data Loss Prevention (DLP) Threat Social Engineering Firewall Patch Zero- Day Exploit Endpoint Security Ransomware Access Control Denial of Service (DoS) Attack Intrusion Detection System (IDS) Public Key Infrastructure (PKI) Cyber Threat Intelligence (CTI) Antivirus Vulnerability Incident Response (IR) Penetration Testing Malware Encryption Data Breach Two-Factor Authentication (2FA) Botnet Virtual Private Network (VPN) Cryptography Phishing Data Loss Prevention (DLP) Threat Social Engineering Firewall
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Patch
Zero-Day Exploit
Endpoint Security
Ransomware
Access Control
Denial of Service (DoS) Attack
Intrusion Detection System (IDS)
Public Key Infrastructure (PKI)
Cyber Threat Intelligence (CTI)
Antivirus
Vulnerability
Incident Response (IR)
Penetration Testing
Malware
Encryption
Data Breach
Two-Factor Authentication (2FA)
Botnet
Virtual Private Network (VPN)
Cryptography
Phishing
Data Loss Prevention (DLP)
Threat
Social Engineering
Firewall