Worm Biometrics Social Engineering Attack User Account Control Computer Virus Adware BYOD Control Panel Vishing Mobile Device Management Authentication Ransomware Multifactor Authentication Trojan Horse PIN Lock Permissions Smart Card Microsoft Azure Physical Attack Antimalware Software Malware Spyware Antivirus Software Keyloggers Firewall Microsoft Intune Worm Biometrics Social Engineering Attack User Account Control Computer Virus Adware BYOD Control Panel Vishing Mobile Device Management Authentication Ransomware Multifactor Authentication Trojan Horse PIN Lock Permissions Smart Card Microsoft Azure Physical Attack Antimalware Software Malware Spyware Antivirus Software Keyloggers Firewall Microsoft Intune
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Worm
Biometrics
Social Engineering Attack
User Account Control
Computer Virus
Adware
BYOD
Control Panel
Vishing
Mobile Device Management
Authentication
Ransomware
Multifactor Authentication
Trojan Horse
PIN Lock
Permissions
Smart Card
Microsoft Azure
Physical Attack
Antimalware Software
Malware
Spyware
Antivirus Software
Keyloggers
Firewall
Microsoft Intune