To use _________________ keys for authentication, you must first generate a pair of RSA or DSA keys with a tool such as PuTTYgen.
Fill in the blank(s) with the appropriate word(s).
public/private
correct
Computer Science & Information Technology
You might also like to view...
Which logical unit of the computer sends information that has already been processed by the computer to various devices so that the information may be used outside the computer? _______ .
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
All of the following are PowerPoint content used to customize slides EXCEPT ____.
A. diagrams B. databases C. video D. shapes
Computer Science & Information Technology
Interpreting a file that contains HTML and CSS and then displaying the resulting Web page is called ____.
A. formatting B. rendering C. interpolating D. cascading
Computer Science & Information Technology
A typical manager engages in over 300 different tasks and decisions each day
Indicate whether the statement is true or false.
Computer Science & Information Technology