MCQs City stays free thanks to ads. Please turn off your ad blocker for this site so content and features keep working.
Computer Networks
Ssh
Q
SSH uses ___________ to authenticate the remote computer.
AA. Public-key cryptography
BB. Private-key cryptography
CC. Any of public-key or private-key
DD. Both public-key & private-key
Correct Answer:
A. A. Public-key cryptography
Explanation:
Public encryption key is slower but more flexible. Every cryptographic security system requires a private key for private access and a public key for location.