PdfPrep.com

Which of the following is a remote access protocol the technician can utilize to bypass interactive user authentication by using a list of known host public keys?

A technician wants to have the ability to transfer files from home to the company’s network on a regular basis.

Which of the following is a remote access protocol the technician can utilize to bypass interactive user authentication by using a list of known host public keys?
A . FTP
B . SCP
C . TFTP
D . Telnet

Answer: B

Exit mobile version