Computer Networks Ssh
Q SSH uses ___________ to authenticate the remote computer.
  • A A. Public-key cryptography
  • B B. Private-key cryptography
  • C C. Any of public-key or private-key
  • D D. Both public-key & private-key
Leave a Comment