When using public/private keys for authentication, what must you do after you generate a pair of keys?
What will be an ideal response?
To use public/private keys for authentication, you must first generate a pair of RSA or Digital Signature Algorithm (DSA) keys with a tool such as PuTTYgen. The public key is then copied to the server, and the private key is kept safe on the client.
You might also like to view...
Describe how to create a table by drawing directly in your document.
What will be an ideal response?
A(n) ____ address is a 48-bit address represented as a 12-digit hexadecimal number given to each network card during production.
A. CRC B. RPC C. LLC D. MAC
What are the two different types of Storage Area Network system?
A. CIFS and SMB B. Fibre Channel and iSCSI C. iSCSI and NFSv3 D. NFSv3 and Samba
Which of the following is NOT a goal of the first session?
A. Establish good rapport B. Gain understanding of the client’s expectations C. Reassure the client that his/her goals will be met D. Ensure an understanding of the client’s problem