1.

SSH uses ___________ to authenticate the remote computer.

A. public-key cryptography
B. private-key cryptography
C. any of public-key or private-key
D. none of the mentioned
Answer» B. private-key cryptography


Discussion

No Comment Found