Wi- Fi Proxy Ethical Hacker Strong Password Router Packet Backup Phishing Ethernet Two- Factor Auth Data Breach Firewall Client Insider Threat Operating System WAN (Wide Area Network) Switch Zero Trust Update / Patch Trojan Horse Firewall Rule Port Number LAN (Local Area Network) Malware Password Digital Footprint Multi-Factor Authentication (MFA) Command Line IP Address Network Cable Cyber Hygiene Ping Server Social Engineering Antivirus DNS (Domain Name System) Encryption Cloud VPN (Virtual Private Network) Ransomware Wi- Fi Proxy Ethical Hacker Strong Password Router Packet Backup Phishing Ethernet Two- Factor Auth Data Breach Firewall Client Insider Threat Operating System WAN (Wide Area Network) Switch Zero Trust Update / Patch Trojan Horse Firewall Rule Port Number LAN (Local Area Network) Malware Password Digital Footprint Multi-Factor Authentication (MFA) Command Line IP Address Network Cable Cyber Hygiene Ping Server Social Engineering Antivirus DNS (Domain Name System) Encryption Cloud VPN (Virtual Private Network) Ransomware
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Wi-Fi
Proxy
Ethical Hacker
Strong Password
Router
Packet
Backup
Phishing
Ethernet
Two-Factor Auth
Data Breach
Firewall
Client
Insider Threat
Operating System
WAN (Wide Area Network)
Switch
Zero Trust
Update / Patch
Trojan Horse
Firewall Rule
Port Number
LAN (Local Area Network)
Malware
Password
Digital Footprint
Multi-Factor Authentication (MFA)
Command Line
IP Address
Network Cable
Cyber Hygiene
Ping
Server
Social Engineering
Antivirus
DNS (Domain Name System)
Encryption
Cloud
VPN (Virtual Private Network)
Ransomware