Wi-FiProxyEthicalHackerStrongPasswordRouterPacketBackupPhishingEthernetTwo-FactorAuthDataBreachFirewallClientInsiderThreatOperatingSystemWAN(WideAreaNetwork)SwitchZeroTrustUpdate/ PatchTrojanHorseFirewallRulePortNumberLAN(LocalAreaNetwork)MalwarePasswordDigitalFootprintMulti-FactorAuthentication(MFA)CommandLineIPAddressNetworkCableCyberHygienePingServerSocialEngineeringAntivirusDNS(DomainNameSystem)EncryptionCloudVPN(VirtualPrivateNetwork)RansomwareWi-FiProxyEthicalHackerStrongPasswordRouterPacketBackupPhishingEthernetTwo-FactorAuthDataBreachFirewallClientInsiderThreatOperatingSystemWAN(WideAreaNetwork)SwitchZeroTrustUpdate/ PatchTrojanHorseFirewallRulePortNumberLAN(LocalAreaNetwork)MalwarePasswordDigitalFootprintMulti-FactorAuthentication(MFA)CommandLineIPAddressNetworkCableCyberHygienePingServerSocialEngineeringAntivirusDNS(DomainNameSystem)EncryptionCloudVPN(VirtualPrivateNetwork)Ransomware

CYBER BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Wi-Fi
  2. Proxy
  3. Ethical Hacker
  4. Strong Password
  5. Router
  6. Packet
  7. Backup
  8. Phishing
  9. Ethernet
  10. Two-Factor Auth
  11. Data Breach
  12. Firewall
  13. Client
  14. Insider Threat
  15. Operating System
  16. WAN (Wide Area Network)
  17. Switch
  18. Zero Trust
  19. Update / Patch
  20. Trojan Horse
  21. Firewall Rule
  22. Port Number
  23. LAN (Local Area Network)
  24. Malware
  25. Password
  26. Digital Footprint
  27. Multi-Factor Authentication (MFA)
  28. Command Line
  29. IP Address
  30. Network Cable
  31. Cyber Hygiene
  32. Ping
  33. Server
  34. Social Engineering
  35. Antivirus
  36. DNS (Domain Name System)
  37. Encryption
  38. Cloud
  39. VPN (Virtual Private Network)
  40. Ransomware