When using public/private keys for authentication, what must you do after you generate a pair of keys?

What will be an ideal response?


To use public/private keys for authentication, you must first generate a pair of RSA or Digital Signature Algorithm (DSA) keys with a tool such as PuTTYgen. The public key is then copied to the server, and the private key is kept safe on the client.
 

Computer Science & Information Technology

You might also like to view...

Describe how to create a table by drawing directly in your document.

What will be an ideal response?

Computer Science & Information Technology

A(n) ____ address is a 48-bit address represented as a 12-digit hexadecimal number given to each network card during production.

A. CRC B. RPC C. LLC D. MAC

Computer Science & Information Technology

What are the two different types of Storage Area Network system?

A. CIFS and SMB B. Fibre Channel and iSCSI C. iSCSI and NFSv3 D. NFSv3 and Samba

Computer Science & Information Technology

Which of the following is NOT a goal of the first session?

A. Establish good rapport B. Gain understanding of the client’s expectations C. Reassure the client that his/her goals will be met D. Ensure an understanding of the client’s problem

Computer Science & Information Technology