Question 17:
Which of the following protocols uses public-key cryptography to authenticate the remote computer?
Answer options:
A. SSH B. Telnet C. SCP D. SSL
Answer correct:
A