In SSH, the private key should be kept secure and the ________ key is added to the server for authentication.
- Public
- Shared
- Admin
- Root
In SSH, the private key should be kept secure, and the public key is added to the server for authentication. The server uses the public key to verify the identity of the connecting client.
Loading...
Related Quiz
- For an SSH server, the main configuration file is found at /etc/ssh/________.
- In shell scripting, a loop that processes each item in a list one by one is known as a _________ loop.
- Which technology allows for OS-level virtualization, resulting in multiple isolated user-space instances?
- The command used to resize the filesystem on a partition in Linux is _________.
- The _________ command provides a way to configure network interfaces, set routing information, and more, and is considered a modern replacement for ifconfig.