A system administrator is setting up a file transfer server. The goal is to encrypt the user authentication and the
files the user is sending using only a user ID and a key pair. Which of the following methods would achieve this
With SSH you can use automatically generated public-private key pairs to encrypt a network connection, and
then use password authentication to log on. Or you can use a manually generated public-private key pair to
perform the authentication, allowing users or programs to log in without having to specify a password.