Question: SSH uses ___________ to authenticate the remote computer.

Options

A : public-key cryptography

B : private-key cryptography

C : any of public-key or private-key

D : both public-key & private-key

Click to view Correct Answer

Previous || Next

Computer Networks Ssh more questions

Which of the following public key distribution systems is most....

Which of these systems use timestamps as an expiration date?

Which system uses a trusted third party interface?

Publicly Available directory is more secure than which other system?

USENET is related to which of the following Public Key....

The process of converting pig iron into wrought iron by....

The process of kneading brick earth is called:

In the preparation of clay for manufacturing tiles, after making....

Tempering is usually done in a __________ in order to....

When compound like ____________ is added to cement during construction,....

Computer Networks Analyzing Subnet Mask more Online Exam Quiz

Computer Networks Rtp

Computer Networks Security

Computer Networks Smtp

Computer Networks Snmp

Computer Networks Sonet

Computer Networks Tcp

Computer Networks Telnet

Computer Networks Test

Computer Networks Transport Layer

Computer Networks Udp