DNS(DomainNameSystem)PasswordWi-FiIPAddressEncryptionWAN(WideAreaNetwork)PhishingOperatingSystemEthicalHackerCloudNetworkCableCommandLineSocialEngineeringDigitalFootprintStrongPasswordTrojanHorsePingVPN(VirtualPrivateNetwork)LAN(LocalAreaNetwork)RouterAntivirusMulti-FactorAuthentication(MFA)PacketEthernetRansomwareDataBreachMalwareBackupClientPortNumberFirewallSwitchFirewallRuleTwo-FactorAuthUpdate/ PatchZeroTrustCyberHygieneProxyInsiderThreatServerDNS(DomainNameSystem)PasswordWi-FiIPAddressEncryptionWAN(WideAreaNetwork)PhishingOperatingSystemEthicalHackerCloudNetworkCableCommandLineSocialEngineeringDigitalFootprintStrongPasswordTrojanHorsePingVPN(VirtualPrivateNetwork)LAN(LocalAreaNetwork)RouterAntivirusMulti-FactorAuthentication(MFA)PacketEthernetRansomwareDataBreachMalwareBackupClientPortNumberFirewallSwitchFirewallRuleTwo-FactorAuthUpdate/ PatchZeroTrustCyberHygieneProxyInsiderThreatServer

CYBER BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. DNS (Domain Name System)
  2. Password
  3. Wi-Fi
  4. IP Address
  5. Encryption
  6. WAN (Wide Area Network)
  7. Phishing
  8. Operating System
  9. Ethical Hacker
  10. Cloud
  11. Network Cable
  12. Command Line
  13. Social Engineering
  14. Digital Footprint
  15. Strong Password
  16. Trojan Horse
  17. Ping
  18. VPN (Virtual Private Network)
  19. LAN (Local Area Network)
  20. Router
  21. Antivirus
  22. Multi-Factor Authentication (MFA)
  23. Packet
  24. Ethernet
  25. Ransomware
  26. Data Breach
  27. Malware
  28. Backup
  29. Client
  30. Port Number
  31. Firewall
  32. Switch
  33. Firewall Rule
  34. Two-Factor Auth
  35. Update / Patch
  36. Zero Trust
  37. Cyber Hygiene
  38. Proxy
  39. Insider Threat
  40. Server