Which of the following protocols uses public-key cryptography to authenticate the remote computer?

Which of the following protocols uses public-key cryptography to authenticate the remote computer?
A . SSH
B . Telnet
C . SCP
D . SSL

Answer: A

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments