ExamQuestions.com

Register
Login
Information Systems Security Architecture Professional (CISSP-ISSAP) Exam Questions

ISC

Information Systems Security Architecture Professional (CISSP-ISSAP)

17 / 115

Question 17:

Which of the following protocols uses public-key cryptography to authenticate the remote computer? 

Answer options:

A. SSH
B. Telnet
C. SCP
D. SSL