Valid replies are both A. (SSH) and D. (SSL)
In SSL, public-key cryptography is used to authenticate the remote computer by having the server present its digital certificate containing its public key during the handshake process. The client verifies this certificate using trusted certification authorities (CAs) to ensure the authenticity and integrity of the remote computer.
In SSH, the client keeps a digest of the last used public key of the remote computer and compares it during subsequent connections to ensure authenticity. Therefore, both SSL and SSH utilize public-key cryptography for authenticating the remote computer in different contexts.
C and D will not be used for remote computer authentication.
upvoted 4 times
...
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
74gjd_37
4 months, 2 weeks agoBanzaaai
1 year, 5 months agoGuest4768
3 years, 9 months ago[Removed]
2 years, 4 months ago