Vulnerability Ransomware Antivirus Encryption Malware Denial of Service (DoS) Attack Zero- Day Exploit Access Control Penetration Testing Botnet Public Key Infrastructure (PKI) Threat Two-Factor Authentication (2FA) Patch Social Engineering Data Loss Prevention (DLP) Incident Response (IR) Virtual Private Network (VPN) Phishing Cyber Threat Intelligence (CTI) Cryptography Intrusion Detection System (IDS) Firewall Endpoint Security Data Breach Vulnerability Ransomware Antivirus Encryption Malware Denial of Service (DoS) Attack Zero- Day Exploit Access Control Penetration Testing Botnet Public Key Infrastructure (PKI) Threat Two-Factor Authentication (2FA) Patch Social Engineering Data Loss Prevention (DLP) Incident Response (IR) Virtual Private Network (VPN) Phishing Cyber Threat Intelligence (CTI) Cryptography Intrusion Detection System (IDS) Firewall Endpoint Security Data Breach
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Vulnerability
Ransomware
Antivirus
Encryption
Malware
Denial of Service (DoS) Attack
Zero-Day Exploit
Access Control
Penetration Testing
Botnet
Public Key Infrastructure (PKI)
Threat
Two-Factor Authentication (2FA)
Patch
Social Engineering
Data Loss Prevention (DLP)
Incident Response (IR)
Virtual Private Network (VPN)
Phishing
Cyber Threat Intelligence (CTI)
Cryptography
Intrusion Detection System (IDS)
Firewall
Endpoint Security
Data Breach