SSH uses ___________ to authenticate the remote computer.
(a) public-key cryptography
(b) private-key cryptography
(c) any of public-key or private-key
(d) both public-key & private-key
The question was asked in an online interview.
I would like to ask this question from SSH in chapter Application Layer of Computer Network