When using public/private keys for authentication, what must you do after you generate a pair of keys?

What will be an ideal response?

After you generate a pair of keys, the public key must be copied to the server and the private key is kept safe on the client.

Computer Science & Information Technology

You might also like to view...

The size of a webpage is not the same size as a standard Word document. in portrait orientation

Indicate whether the statement is true or false

Computer Science & Information Technology

________ arises in three different contexts: multiple applications, structured applications, and operating system structure.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology