ISC ISSAP Information Systems Security Architecture Professional ISSAP Question # 40 Topic 5 Discussion

ISC ISSAP Information Systems Security Architecture Professional ISSAP Question # 40 Topic 5 Discussion

ISSAP Exam Topic 5 Question 40 Discussion:
Question #: 40
Topic #: 5

Which of the following protocols uses public-key cryptography to authenticate the remote computer?


A.

SSH


B.

Telnet


C.

SCP


D.

SSL


Get Premium ISSAP Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.