Firewall Password Router WAN (Wide Area Network) Malware Proxy Port Number Network Cable Trojan Horse VPN (Virtual Private Network) Ping Antivirus IP Address Zero Trust Multi-Factor Authentication (MFA) Cyber Hygiene LAN (Local Area Network) Client Data Breach Two- Factor Auth Switch Ransomware Strong Password Update / Patch Digital Footprint Server Cloud Operating System Packet Firewall Rule DNS (Domain Name System) Insider Threat Backup Ethernet Command Line Ethical Hacker Wi- Fi Social Engineering Phishing Encryption Firewall Password Router WAN (Wide Area Network) Malware Proxy Port Number Network Cable Trojan Horse VPN (Virtual Private Network) Ping Antivirus IP Address Zero Trust Multi-Factor Authentication (MFA) Cyber Hygiene LAN (Local Area Network) Client Data Breach Two- Factor Auth Switch Ransomware Strong Password Update / Patch Digital Footprint Server Cloud Operating System Packet Firewall Rule DNS (Domain Name System) Insider Threat Backup Ethernet Command Line Ethical Hacker Wi- Fi Social Engineering Phishing Encryption
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Firewall
Password
Router
WAN (Wide Area Network)
Malware
Proxy
Port Number
Network Cable
Trojan Horse
VPN (Virtual Private Network)
Ping
Antivirus
IP Address
Zero Trust
Multi-Factor Authentication (MFA)
Cyber Hygiene
LAN (Local Area Network)
Client
Data Breach
Two-Factor Auth
Switch
Ransomware
Strong Password
Update / Patch
Digital Footprint
Server
Cloud
Operating System
Packet
Firewall Rule
DNS (Domain Name System)
Insider Threat
Backup
Ethernet
Command Line
Ethical Hacker
Wi-Fi
Social Engineering
Phishing
Encryption