Which of the following is a remote access protocol the technician can utilize to bypass interactive user authentication by using a list of known host public keys?

A technician wants to have the ability to transfer files from home to the company’s network on a regular basis.

Which of the following is a remote access protocol the technician can utilize to bypass interactive user authentication by using a list of known host public keys?
A . FTP
B . SCP
C . TFTP
D . Telnet

Answer: B

Latest N10-007 Dumps Valid Version with 601 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments