Router Packet Update / Patch Zero Trust LAN (Local Area Network) WAN (Wide Area Network) Multi-Factor Authentication (MFA) Command Line Ransomware DNS (Domain Name System) Trojan Horse Firewall Rule Wi- Fi Encryption Phishing Digital Footprint VPN (Virtual Private Network) Operating System Social Engineering Switch Two- Factor Auth Server Proxy Firewall IP Address Antivirus Cyber Hygiene Ethernet Data Breach Insider Threat Strong Password Cloud Backup Ethical Hacker Malware Client Password Port Number Ping Network Cable Router Packet Update / Patch Zero Trust LAN (Local Area Network) WAN (Wide Area Network) Multi-Factor Authentication (MFA) Command Line Ransomware DNS (Domain Name System) Trojan Horse Firewall Rule Wi- Fi Encryption Phishing Digital Footprint VPN (Virtual Private Network) Operating System Social Engineering Switch Two- Factor Auth Server Proxy Firewall IP Address Antivirus Cyber Hygiene Ethernet Data Breach Insider Threat Strong Password Cloud Backup Ethical Hacker Malware Client Password Port Number Ping Network Cable
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Router
Packet
Update / Patch
Zero Trust
LAN (Local Area Network)
WAN (Wide Area Network)
Multi-Factor Authentication (MFA)
Command Line
Ransomware
DNS (Domain Name System)
Trojan Horse
Firewall Rule
Wi-Fi
Encryption
Phishing
Digital Footprint
VPN (Virtual Private Network)
Operating System
Social Engineering
Switch
Two-Factor Auth
Server
Proxy
Firewall
IP Address
Antivirus
Cyber Hygiene
Ethernet
Data Breach
Insider Threat
Strong Password
Cloud
Backup
Ethical Hacker
Malware
Client
Password
Port Number
Ping
Network Cable