FirewallPasswordRouterWAN(WideAreaNetwork)MalwareProxyPortNumberNetworkCableTrojanHorseVPN(VirtualPrivateNetwork)PingAntivirusIPAddressZeroTrustMulti-FactorAuthentication(MFA)CyberHygieneLAN(LocalAreaNetwork)ClientDataBreachTwo-FactorAuthSwitchRansomwareStrongPasswordUpdate/ PatchDigitalFootprintServerCloudOperatingSystemPacketFirewallRuleDNS(DomainNameSystem)InsiderThreatBackupEthernetCommandLineEthicalHackerWi-FiSocialEngineeringPhishingEncryptionFirewallPasswordRouterWAN(WideAreaNetwork)MalwareProxyPortNumberNetworkCableTrojanHorseVPN(VirtualPrivateNetwork)PingAntivirusIPAddressZeroTrustMulti-FactorAuthentication(MFA)CyberHygieneLAN(LocalAreaNetwork)ClientDataBreachTwo-FactorAuthSwitchRansomwareStrongPasswordUpdate/ PatchDigitalFootprintServerCloudOperatingSystemPacketFirewallRuleDNS(DomainNameSystem)InsiderThreatBackupEthernetCommandLineEthicalHackerWi-FiSocialEngineeringPhishingEncryption

CYBER BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Firewall
  2. Password
  3. Router
  4. WAN (Wide Area Network)
  5. Malware
  6. Proxy
  7. Port Number
  8. Network Cable
  9. Trojan Horse
  10. VPN (Virtual Private Network)
  11. Ping
  12. Antivirus
  13. IP Address
  14. Zero Trust
  15. Multi-Factor Authentication (MFA)
  16. Cyber Hygiene
  17. LAN (Local Area Network)
  18. Client
  19. Data Breach
  20. Two-Factor Auth
  21. Switch
  22. Ransomware
  23. Strong Password
  24. Update / Patch
  25. Digital Footprint
  26. Server
  27. Cloud
  28. Operating System
  29. Packet
  30. Firewall Rule
  31. DNS (Domain Name System)
  32. Insider Threat
  33. Backup
  34. Ethernet
  35. Command Line
  36. Ethical Hacker
  37. Wi-Fi
  38. Social Engineering
  39. Phishing
  40. Encryption