QUESTION 1 Once a key has been created with SSH, where is the most appropriate place to store it? A. On trusted computers the user will use B. USB/CDROM C. Only on the computer that created the key D. In a separate building
QUESTION 1 Once a key has been created with SSH, where is the most appropriate place to store it? A. On trusted computers the user will use B. USB/CDROM C. Only on the computer that created the key D. In a separate building