Which one of the following authentication methods is used by SSH?
Автор: TechWiseNow
Загружено: 2024-11-04
Просмотров: 52
Описание:
Question:
Which one of the following authentication methods is used by SSH?
a) Public-key
b) Host-based
c) Password
d) All of the mentioned
Answer:
d) All of the mentioned
SSH (Secure Shell) provides multiple authentication methods to ensure secure access 🔐 to remote systems. The most common ones include:
Public-key Authentication: This method uses a pair of cryptographic keys, a public key stored on the server and a private key kept by the user 🔑. It ensures that only users with the correct private key can log in.
Host-based Authentication: In this method, a host verifies the identity of another trusted host 🖥️. This is useful in environments where multiple systems need secure interconnection.
Password Authentication: Users can also log in using traditional passwords 🔒, though this method is less secure compared to public-key authentication.
SSH supports all of these methods, allowing flexibility based on the security needs of the system!
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: