

MCQOPTIONS
Saved Bookmarks
1. |
SSH uses ___________ to authenticate the remote computer. |
A. | public-key cryptography |
B. | private-key cryptography |
C. | any of public-key or private-key |
D. | both public-key & private-key |
Answer» B. private-key cryptography | |