1.

SSH uses ___________ to authenticate the remote computer.

A. public-key cryptography
B. private-key cryptography
C. any of public-key or private-key
D. both public-key & private-key
Answer» B. private-key cryptography


Discussion

No Comment Found