A technician wants to have the ability to transfer files from home to the company's network on a regular basis.
Which of the following is a remote access protocol the technician can utilize to bypass interactive user authentication by using a list of known host public keys?
A.
FTP B.
SCP C.
TFTP D.
Telnet.
B.
A technician wants to have the ability to transfer files from home to the company's network on a regular basis.
Which of the following is a remote access protocol the technician can utilize to bypass interactive user authentication by using a list of known host public keys?
A.
FTP
B.
SCP
C.
TFTP
D.
Telnet.
B.
The remote access protocol that the technician can utilize to bypass interactive user authentication by using a list of known host public keys is SCP (Secure Copy Protocol).
SCP is a secure file transfer protocol that allows secure transfer of files between remote hosts. It is based on SSH (Secure Shell), which provides a secure encrypted connection between two hosts. SCP uses the same authentication and encryption mechanisms as SSH, making it a secure way to transfer files over the network.
SCP allows a user to transfer files from a remote host to a local host or vice versa. It also allows a user to copy files between two remote hosts. SCP uses a list of known host public keys to verify the identity of the remote host. This is known as host-based authentication, which is a more secure form of authentication than user-based authentication.
FTP (File Transfer Protocol) is a remote access protocol that allows files to be transferred between hosts over the network. However, FTP is not a secure protocol and does not provide encryption or authentication mechanisms.
TFTP (Trivial File Transfer Protocol) is a simpler version of FTP that is used for transferring small files over the network. TFTP does not provide any security mechanisms and is not suitable for transferring sensitive files.
Telnet is a remote access protocol that provides a command-line interface to a remote host. Telnet does not provide any encryption or authentication mechanisms and is not suitable for transferring files over the network.
In summary, SCP is the best remote access protocol for transferring files securely over the network as it provides encryption and host-based authentication mechanisms.