DNS (Domain Name System) Password Wi- Fi IP Address Encryption WAN (Wide Area Network) Phishing Operating System Ethical Hacker Cloud Network Cable Command Line Social Engineering Digital Footprint Strong Password Trojan Horse Ping VPN (Virtual Private Network) LAN (Local Area Network) Router Antivirus Multi-Factor Authentication (MFA) Packet Ethernet Ransomware Data Breach Malware Backup Client Port Number Firewall Switch Firewall Rule Two- Factor Auth Update / Patch Zero Trust Cyber Hygiene Proxy Insider Threat Server DNS (Domain Name System) Password Wi- Fi IP Address Encryption WAN (Wide Area Network) Phishing Operating System Ethical Hacker Cloud Network Cable Command Line Social Engineering Digital Footprint Strong Password Trojan Horse Ping VPN (Virtual Private Network) LAN (Local Area Network) Router Antivirus Multi-Factor Authentication (MFA) Packet Ethernet Ransomware Data Breach Malware Backup Client Port Number Firewall Switch Firewall Rule Two- Factor Auth Update / Patch Zero Trust Cyber Hygiene Proxy Insider Threat Server
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
DNS (Domain Name System)
Password
Wi-Fi
IP Address
Encryption
WAN (Wide Area Network)
Phishing
Operating System
Ethical Hacker
Cloud
Network Cable
Command Line
Social Engineering
Digital Footprint
Strong Password
Trojan Horse
Ping
VPN (Virtual Private Network)
LAN (Local Area Network)
Router
Antivirus
Multi-Factor Authentication (MFA)
Packet
Ethernet
Ransomware
Data Breach
Malware
Backup
Client
Port Number
Firewall
Switch
Firewall Rule
Two-Factor Auth
Update / Patch
Zero Trust
Cyber Hygiene
Proxy
Insider Threat
Server