A system administrator is setting up a file transfer server. The goal is to encrypt the user
authentication and the files the user is sending using only a user ID and a key pair. Which of the
following methods would achieve this goal?
A.
AES
B.
IPSec
C.
PGP
D.
SSH
Explanation:
With SSH you can use automatically generated public-private key pairs to encrypt a network
connection, and then use password authentication to log on. Or you can use a manually generated
public-private key pair to perform the authentication, allowing users or programs to log in without
having to specify a password.