Switch Multi-Factor Authentication (MFA) Operating System Firewall Digital Footprint Password Phishing Proxy VPN (Virtual Private Network) Port Number Insider Threat Two- Factor Auth Firewall Rule DNS (Domain Name System) Server Ethernet IP Address Ransomware Data Breach Cloud Update / Patch Backup Ethical Hacker Malware Packet Cyber Hygiene Router Zero Trust Command Line Client Network Cable LAN (Local Area Network) Antivirus Encryption Wi- Fi Strong Password Ping WAN (Wide Area Network) Trojan Horse Social Engineering Switch Multi-Factor Authentication (MFA) Operating System Firewall Digital Footprint Password Phishing Proxy VPN (Virtual Private Network) Port Number Insider Threat Two- Factor Auth Firewall Rule DNS (Domain Name System) Server Ethernet IP Address Ransomware Data Breach Cloud Update / Patch Backup Ethical Hacker Malware Packet Cyber Hygiene Router Zero Trust Command Line Client Network Cable LAN (Local Area Network) Antivirus Encryption Wi- Fi Strong Password Ping WAN (Wide Area Network) Trojan Horse Social Engineering
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Switch
Multi-Factor Authentication (MFA)
Operating System
Firewall
Digital Footprint
Password
Phishing
Proxy
VPN (Virtual Private Network)
Port Number
Insider Threat
Two-Factor Auth
Firewall Rule
DNS (Domain Name System)
Server
Ethernet
IP Address
Ransomware
Data Breach
Cloud
Update / Patch
Backup
Ethical Hacker
Malware
Packet
Cyber Hygiene
Router
Zero Trust
Command Line
Client
Network Cable
LAN (Local Area Network)
Antivirus
Encryption
Wi-Fi
Strong Password
Ping
WAN (Wide Area Network)
Trojan Horse
Social Engineering