To use _________________ keys for authentication, you must first generate a pair of RSA or DSA keys with a tool such as PuTTYgen.

Fill in the blank(s) with the appropriate word(s).


public/private

correct

Computer Science & Information Technology

You might also like to view...

Which logical unit of the computer sends information that has already been processed by the computer to various devices so that the information may be used outside the computer? _______ .

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

All of the following are PowerPoint content used to customize slides EXCEPT ____.

A. diagrams B. databases C. video D. shapes

Computer Science & Information Technology

Interpreting a file that contains HTML and CSS and then displaying the resulting Web page is called ____.

A. formatting B. rendering C. interpolating D. cascading

Computer Science & Information Technology

A typical manager engages in over 300 different tasks and decisions each day

Indicate whether the statement is true or false.

Computer Science & Information Technology