InterviewSolution
Saved Bookmarks
| 1. |
SSH uses ___________ to authenticate the remote computer.(a) public-key cryptography(b) private-key cryptography(c) any of public-key or private-key(d) both public-key & private-keyThe question was asked in an online interview.I would like to ask this question from SSH in chapter Application Layer of Computer Network |
|
Answer» The correct answer is (a) public-key cryptography |
|