1.

SSH uses ___________ to authenticate the remote computer.(a) public-key cryptography(b) private-key cryptography(c) any of public-key or private-key(d) both public-key & private-keyThe question was asked in an online interview.I would like to ask this question from SSH in chapter Application Layer of Computer Network

Answer»

The correct answer is (a) public-key cryptography

For explanation I WOULD say: Public ENCRYPTION key is SLOWER but more flexible. Every cryptographic security SYSTEM requires a private key for private access and a public key for location.



Discussion

No Comment Found

Related InterviewSolutions