Your co-worker is not familiar with technical concepts. He asks you to explain Secure Shell (SSH) and the way it works. Which of the following is an appropriate and accurate explanation you can give to this non-technical person?
SSH uses RSA and public keys to authenticate and encrypt before you can defragment the hard drive.
SSH uses a Telnet-like interface, public keys are standard authentication methods, and then symmetric keys.
SSH allows you to gain secure access to a remote computer and then execute commands to control the system.
SSH uses DSA and RSA to protect authentication information, and asymmetric-key encryption to provide data confidentiality.