Question: In addition to usernames / passwords , Secure Shell ( SSH ) can authenticate a user based upon: the user's Internet Protocol ( IP )
In addition to usernamespasswords Secure Shell SSH can authenticate a user based upon:
the user's Internet Protocol IP address.
the user's domain name.
fingerprint technology.
a passphrase using a public and a private key.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
