When using public/private keys for authentication, what must you do after you generate a pair of keys?
What will be an ideal response?
After you generate a pair of keys, the public key must be copied to the server and the private key is kept safe on the client.
Computer Science & Information Technology
You might also like to view...
The size of a webpage is not the same size as a standard Word document. in portrait orientation
Indicate whether the statement is true or false
Computer Science & Information Technology
________ arises in three different contexts: multiple applications, structured applications, and operating system structure.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology