Insider Threat Strong Password Proxy Multi-Factor Authentication (MFA) Backup Encryption VPN (Virtual Private Network) Firewall Firewall Rule Password LAN (Local Area Network) DNS (Domain Name System) Command Line Packet Server Antivirus Network Cable Ethernet Ethical Hacker Wi- Fi Switch Router Trojan Horse Ransomware Cyber Hygiene Malware Data Breach IP Address Cloud Zero Trust Ping Phishing Client Update / Patch Digital Footprint Social Engineering Port Number Operating System Two- Factor Auth WAN (Wide Area Network) Insider Threat Strong Password Proxy Multi-Factor Authentication (MFA) Backup Encryption VPN (Virtual Private Network) Firewall Firewall Rule Password LAN (Local Area Network) DNS (Domain Name System) Command Line Packet Server Antivirus Network Cable Ethernet Ethical Hacker Wi- Fi Switch Router Trojan Horse Ransomware Cyber Hygiene Malware Data Breach IP Address Cloud Zero Trust Ping Phishing Client Update / Patch Digital Footprint Social Engineering Port Number Operating System Two- Factor Auth WAN (Wide Area Network)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Insider Threat
Strong Password
Proxy
Multi-Factor Authentication (MFA)
Backup
Encryption
VPN (Virtual Private Network)
Firewall
Firewall Rule
Password
LAN (Local Area Network)
DNS (Domain Name System)
Command Line
Packet
Server
Antivirus
Network Cable
Ethernet
Ethical Hacker
Wi-Fi
Switch
Router
Trojan Horse
Ransomware
Cyber Hygiene
Malware
Data Breach
IP Address
Cloud
Zero Trust
Ping
Phishing
Client
Update / Patch
Digital Footprint
Social Engineering
Port Number
Operating System
Two-Factor Auth
WAN (Wide Area Network)