CloudStrongPasswordMulti-FactorAuthentication(MFA)CommandLineClientPortNumberDigitalFootprintBackupAntivirusUpdate/ PatchLAN(LocalAreaNetwork)RouterEthicalHackerSocialEngineeringProxyEncryptionPingWi-FiServerRansomwareNetworkCableMalwareVPN(VirtualPrivateNetwork)ZeroTrustCyberHygieneFirewallDNS(DomainNameSystem)FirewallRuleWAN(WideAreaNetwork)TrojanHorsePacketEthernetSwitchPhishingIPAddressTwo-FactorAuthDataBreachOperatingSystemInsiderThreatPasswordCloudStrongPasswordMulti-FactorAuthentication(MFA)CommandLineClientPortNumberDigitalFootprintBackupAntivirusUpdate/ PatchLAN(LocalAreaNetwork)RouterEthicalHackerSocialEngineeringProxyEncryptionPingWi-FiServerRansomwareNetworkCableMalwareVPN(VirtualPrivateNetwork)ZeroTrustCyberHygieneFirewallDNS(DomainNameSystem)FirewallRuleWAN(WideAreaNetwork)TrojanHorsePacketEthernetSwitchPhishingIPAddressTwo-FactorAuthDataBreachOperatingSystemInsiderThreatPassword

CYBER BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Cloud
  2. Strong Password
  3. Multi-Factor Authentication (MFA)
  4. Command Line
  5. Client
  6. Port Number
  7. Digital Footprint
  8. Backup
  9. Antivirus
  10. Update / Patch
  11. LAN (Local Area Network)
  12. Router
  13. Ethical Hacker
  14. Social Engineering
  15. Proxy
  16. Encryption
  17. Ping
  18. Wi-Fi
  19. Server
  20. Ransomware
  21. Network Cable
  22. Malware
  23. VPN (Virtual Private Network)
  24. Zero Trust
  25. Cyber Hygiene
  26. Firewall
  27. DNS (Domain Name System)
  28. Firewall Rule
  29. WAN (Wide Area Network)
  30. Trojan Horse
  31. Packet
  32. Ethernet
  33. Switch
  34. Phishing
  35. IP Address
  36. Two-Factor Auth
  37. Data Breach
  38. Operating System
  39. Insider Threat
  40. Password