Backup Firewall Rule Wi- Fi Ethernet Digital Footprint Multi-Factor Authentication (MFA) Malware Ping Zero Trust IP Address Phishing Packet Cyber Hygiene Insider Threat Network Cable Social Engineering Command Line Strong Password Update / Patch Port Number Client DNS (Domain Name System) Server WAN (Wide Area Network) Ransomware Two- Factor Auth Operating System Trojan Horse Data Breach Firewall VPN (Virtual Private Network) Encryption Router Antivirus Password Ethical Hacker LAN (Local Area Network) Proxy Switch Cloud Backup Firewall Rule Wi- Fi Ethernet Digital Footprint Multi-Factor Authentication (MFA) Malware Ping Zero Trust IP Address Phishing Packet Cyber Hygiene Insider Threat Network Cable Social Engineering Command Line Strong Password Update / Patch Port Number Client DNS (Domain Name System) Server WAN (Wide Area Network) Ransomware Two- Factor Auth Operating System Trojan Horse Data Breach Firewall VPN (Virtual Private Network) Encryption Router Antivirus Password Ethical Hacker LAN (Local Area Network) Proxy Switch Cloud
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Backup
Firewall Rule
Wi-Fi
Ethernet
Digital Footprint
Multi-Factor Authentication (MFA)
Malware
Ping
Zero Trust
IP Address
Phishing
Packet
Cyber Hygiene
Insider Threat
Network Cable
Social Engineering
Command Line
Strong Password
Update / Patch
Port Number
Client
DNS (Domain Name System)
Server
WAN (Wide Area Network)
Ransomware
Two-Factor Auth
Operating System
Trojan Horse
Data Breach
Firewall
VPN (Virtual Private Network)
Encryption
Router
Antivirus
Password
Ethical Hacker
LAN (Local Area Network)
Proxy
Switch
Cloud