Which of the following is a remote access protocol the technician can utilize to bypass interactive user authentication by using a list of known host public keys?

Posted by: Pdfprep Category: N10-007 Tags: , ,

A technician wants to have the ability to transfer files from home to the company’s network on a regular basis.

Which of the following is a remote access protocol the technician can utilize to bypass interactive user authentication by using a list of known host public keys?
A . FTP
B . SCP
C . TFTP
D . Telnet

Answer: B

Leave a Reply

Your email address will not be published.