Which of the following is a cornerstone of the SSH protocol?
RSA encryption
Kerberos authentication
Two-factor authentication
Password authentication

Network Security Exercises are loading ...