InsiderThreatStrongPasswordProxyMulti-FactorAuthentication(MFA)BackupEncryptionVPN(VirtualPrivateNetwork)FirewallFirewallRulePasswordLAN(LocalAreaNetwork)DNS(DomainNameSystem)CommandLinePacketServerAntivirusNetworkCableEthernetEthicalHackerWi-FiSwitchRouterTrojanHorseRansomwareCyberHygieneMalwareDataBreachIPAddressCloudZeroTrustPingPhishingClientUpdate/ PatchDigitalFootprintSocialEngineeringPortNumberOperatingSystemTwo-FactorAuthWAN(WideAreaNetwork)InsiderThreatStrongPasswordProxyMulti-FactorAuthentication(MFA)BackupEncryptionVPN(VirtualPrivateNetwork)FirewallFirewallRulePasswordLAN(LocalAreaNetwork)DNS(DomainNameSystem)CommandLinePacketServerAntivirusNetworkCableEthernetEthicalHackerWi-FiSwitchRouterTrojanHorseRansomwareCyberHygieneMalwareDataBreachIPAddressCloudZeroTrustPingPhishingClientUpdate/ PatchDigitalFootprintSocialEngineeringPortNumberOperatingSystemTwo-FactorAuthWAN(WideAreaNetwork)

CYBER BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Insider Threat
  2. Strong Password
  3. Proxy
  4. Multi-Factor Authentication (MFA)
  5. Backup
  6. Encryption
  7. VPN (Virtual Private Network)
  8. Firewall
  9. Firewall Rule
  10. Password
  11. LAN (Local Area Network)
  12. DNS (Domain Name System)
  13. Command Line
  14. Packet
  15. Server
  16. Antivirus
  17. Network Cable
  18. Ethernet
  19. Ethical Hacker
  20. Wi-Fi
  21. Switch
  22. Router
  23. Trojan Horse
  24. Ransomware
  25. Cyber Hygiene
  26. Malware
  27. Data Breach
  28. IP Address
  29. Cloud
  30. Zero Trust
  31. Ping
  32. Phishing
  33. Client
  34. Update / Patch
  35. Digital Footprint
  36. Social Engineering
  37. Port Number
  38. Operating System
  39. Two-Factor Auth
  40. WAN (Wide Area Network)