Endpoint Security Zero- Day Exploit Threat Data Loss Prevention (DLP) Penetration Testing Botnet Data Breach Denial of Service (DoS) Attack Phishing Patch Ransomware Vulnerability Antivirus Incident Response (IR) Cryptography Malware Cyber Threat Intelligence (CTI) Intrusion Detection System (IDS) Virtual Private Network (VPN) Access Control Firewall Two-Factor Authentication (2FA) Social Engineering Public Key Infrastructure (PKI) Encryption Endpoint Security Zero- Day Exploit Threat Data Loss Prevention (DLP) Penetration Testing Botnet Data Breach Denial of Service (DoS) Attack Phishing Patch Ransomware Vulnerability Antivirus Incident Response (IR) Cryptography Malware Cyber Threat Intelligence (CTI) Intrusion Detection System (IDS) Virtual Private Network (VPN) Access Control Firewall Two-Factor Authentication (2FA) Social Engineering Public Key Infrastructure (PKI) Encryption
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Endpoint Security
Zero-Day Exploit
Threat
Data Loss Prevention (DLP)
Penetration Testing
Botnet
Data Breach
Denial of Service (DoS) Attack
Phishing
Patch
Ransomware
Vulnerability
Antivirus
Incident Response (IR)
Cryptography
Malware
Cyber Threat Intelligence (CTI)
Intrusion Detection System (IDS)
Virtual Private Network (VPN)
Access Control
Firewall
Two-Factor Authentication (2FA)
Social Engineering
Public Key Infrastructure (PKI)
Encryption