Question: SSH uses ___________ to authenticate the remote computer.
Options
A : public-key cryptography
B : private-key cryptography
C : any of public-key or private-key
D : both public-key & private-key
Click to view Correct Answer
Computer Networks Ssh more questions
Which of the following public key distribution systems is most....
Which of these systems use timestamps as an expiration date?
Which system uses a trusted third party interface?
Publicly Available directory is more secure than which other system?
USENET is related to which of the following Public Key....
The process of converting pig iron into wrought iron by....
The process of kneading brick earth is called:
In the preparation of clay for manufacturing tiles, after making....
Tempering is usually done in a __________ in order to....
When compound like ____________ is added to cement during construction,....