Cloud Strong Password Multi-Factor Authentication (MFA) Command Line Client Port Number Digital Footprint Backup Antivirus Update / Patch LAN (Local Area Network) Router Ethical Hacker Social Engineering Proxy Encryption Ping Wi- Fi Server Ransomware Network Cable Malware VPN (Virtual Private Network) Zero Trust Cyber Hygiene Firewall DNS (Domain Name System) Firewall Rule WAN (Wide Area Network) Trojan Horse Packet Ethernet Switch Phishing IP Address Two- Factor Auth Data Breach Operating System Insider Threat Password Cloud Strong Password Multi-Factor Authentication (MFA) Command Line Client Port Number Digital Footprint Backup Antivirus Update / Patch LAN (Local Area Network) Router Ethical Hacker Social Engineering Proxy Encryption Ping Wi- Fi Server Ransomware Network Cable Malware VPN (Virtual Private Network) Zero Trust Cyber Hygiene Firewall DNS (Domain Name System) Firewall Rule WAN (Wide Area Network) Trojan Horse Packet Ethernet Switch Phishing IP Address Two- Factor Auth Data Breach Operating System Insider Threat Password
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cloud
Strong Password
Multi-Factor Authentication (MFA)
Command Line
Client
Port Number
Digital Footprint
Backup
Antivirus
Update / Patch
LAN (Local Area Network)
Router
Ethical Hacker
Social Engineering
Proxy
Encryption
Ping
Wi-Fi
Server
Ransomware
Network Cable
Malware
VPN (Virtual Private Network)
Zero Trust
Cyber Hygiene
Firewall
DNS (Domain Name System)
Firewall Rule
WAN (Wide Area Network)
Trojan Horse
Packet
Ethernet
Switch
Phishing
IP Address
Two-Factor Auth
Data Breach
Operating System
Insider Threat
Password