BackupFirewallRuleWi-FiEthernetDigitalFootprintMulti-FactorAuthentication(MFA)MalwarePingZeroTrustIPAddressPhishingPacketCyberHygieneInsiderThreatNetworkCableSocialEngineeringCommandLineStrongPasswordUpdate/ PatchPortNumberClientDNS(DomainNameSystem)ServerWAN(WideAreaNetwork)RansomwareTwo-FactorAuthOperatingSystemTrojanHorseDataBreachFirewallVPN(VirtualPrivateNetwork)EncryptionRouterAntivirusPasswordEthicalHackerLAN(LocalAreaNetwork)ProxySwitchCloudBackupFirewallRuleWi-FiEthernetDigitalFootprintMulti-FactorAuthentication(MFA)MalwarePingZeroTrustIPAddressPhishingPacketCyberHygieneInsiderThreatNetworkCableSocialEngineeringCommandLineStrongPasswordUpdate/ PatchPortNumberClientDNS(DomainNameSystem)ServerWAN(WideAreaNetwork)RansomwareTwo-FactorAuthOperatingSystemTrojanHorseDataBreachFirewallVPN(VirtualPrivateNetwork)EncryptionRouterAntivirusPasswordEthicalHackerLAN(LocalAreaNetwork)ProxySwitchCloud

CYBER BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Backup
  2. Firewall Rule
  3. Wi-Fi
  4. Ethernet
  5. Digital Footprint
  6. Multi-Factor Authentication (MFA)
  7. Malware
  8. Ping
  9. Zero Trust
  10. IP Address
  11. Phishing
  12. Packet
  13. Cyber Hygiene
  14. Insider Threat
  15. Network Cable
  16. Social Engineering
  17. Command Line
  18. Strong Password
  19. Update / Patch
  20. Port Number
  21. Client
  22. DNS (Domain Name System)
  23. Server
  24. WAN (Wide Area Network)
  25. Ransomware
  26. Two-Factor Auth
  27. Operating System
  28. Trojan Horse
  29. Data Breach
  30. Firewall
  31. VPN (Virtual Private Network)
  32. Encryption
  33. Router
  34. Antivirus
  35. Password
  36. Ethical Hacker
  37. LAN (Local Area Network)
  38. Proxy
  39. Switch
  40. Cloud