Network Admin - Valentine's Day 2024

Edit Answers
NOJODNAJQBQSTYOFAQAN CWRLTRMJGUAESNDQSAFT HDAZXFXYFGDSQJCBCVBM QLPKIOSKCIPHERTEXTAL FQRXZYQEVQNAHFPBZXFA GDLYIJSEORQSNWBRSCZM IVUNPKVQSSSMGRYAZITU UPJFEIWPKXOIKLEEKRYO RTXYDSAEANFERSKCJTUI MXMYUTVSPNGSFEAVLEGB HTVMZLBLYYMSNDHAAMQS DSMYIYXDKMDHTOSFPMUP VXCTACACSRMHLEDQIYVA FJBHIPYZRWKETXNOCSBL EXEBPEMMFYFNTDAUNITQ DGDPVEGCELBLZRHWIEFW POPKERBEROSUKFIJRMKX GUCOSHRXFEPSVZRCPPUX PXLNPESSISVMLYFQFPKN FMDEROKYRZEPQLVAFFVW
1.
three-headed dog of Hades
2.
The type of encryption also known as private key
3.
The type of encryption also known as public key
4.
The gibberish produce by encrypting a message
5.
The earlier version of RADIUS
6.
System where digital certificates are issued by a CA
7.
Public key scheme used mainly to encrypt email messages
8.
Public key scheme used in to protect web traffic
9.
The name of the SSL protocol which creates the session
10.
Replacement for Telnet for remotely accessing a host
11.
Kerberos term for the client/user
12.
Optional encryption tool for the IEEE 802.11 standard
13.
Private Key scheme which uses a 56-bit key
14.
Stronger Private Key scheme which uses keys 128, 160, 192 or 256-bits long