SwitchMulti-FactorAuthentication(MFA)OperatingSystemFirewallDigitalFootprintPasswordPhishingProxyVPN(VirtualPrivateNetwork)PortNumberInsiderThreatTwo-FactorAuthFirewallRuleDNS(DomainNameSystem)ServerEthernetIPAddressRansomwareDataBreachCloudUpdate/ PatchBackupEthicalHackerMalwarePacketCyberHygieneRouterZeroTrustCommandLineClientNetworkCableLAN(LocalAreaNetwork)AntivirusEncryptionWi-FiStrongPasswordPingWAN(WideAreaNetwork)TrojanHorseSocialEngineeringSwitchMulti-FactorAuthentication(MFA)OperatingSystemFirewallDigitalFootprintPasswordPhishingProxyVPN(VirtualPrivateNetwork)PortNumberInsiderThreatTwo-FactorAuthFirewallRuleDNS(DomainNameSystem)ServerEthernetIPAddressRansomwareDataBreachCloudUpdate/ PatchBackupEthicalHackerMalwarePacketCyberHygieneRouterZeroTrustCommandLineClientNetworkCableLAN(LocalAreaNetwork)AntivirusEncryptionWi-FiStrongPasswordPingWAN(WideAreaNetwork)TrojanHorseSocialEngineering

CYBER BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Switch
  2. Multi-Factor Authentication (MFA)
  3. Operating System
  4. Firewall
  5. Digital Footprint
  6. Password
  7. Phishing
  8. Proxy
  9. VPN (Virtual Private Network)
  10. Port Number
  11. Insider Threat
  12. Two-Factor Auth
  13. Firewall Rule
  14. DNS (Domain Name System)
  15. Server
  16. Ethernet
  17. IP Address
  18. Ransomware
  19. Data Breach
  20. Cloud
  21. Update / Patch
  22. Backup
  23. Ethical Hacker
  24. Malware
  25. Packet
  26. Cyber Hygiene
  27. Router
  28. Zero Trust
  29. Command Line
  30. Client
  31. Network Cable
  32. LAN (Local Area Network)
  33. Antivirus
  34. Encryption
  35. Wi-Fi
  36. Strong Password
  37. Ping
  38. WAN (Wide Area Network)
  39. Trojan Horse
  40. Social Engineering