Google News
logo
Networking - Quiz(MCQ)
SSH uses ______ to authenticate the remote computer.
A)
private-key cryptography
B)
public-key cryptography
C)
both public-key & private-key
D)
any of public-key or private-key

Correct Answer :   public-key cryptography


Explanation : Public encryption key is slower but more flexible. Every cryptographic security system requires a private key for private access and a public key for location.

Advertisement