Q. SSH uses ___________ to authenticate the remote computer. (Solved)
1. public-key cryptography
2. private-key cryptography
3. any of public-key or private-key
4. both public-key & private-key
- a. public-key cryptography
1. public-key cryptography
2. private-key cryptography
3. any of public-key or private-key
4. both public-key & private-key