A security architect is designing a remote access solution for a business partner. The business partner needs to access one Linux server at the company. The business partner wants to avoid managing a password for authentication and additional software installation. Which of the following should the architect recommend?
ApplebeesWaiter1122
Highly Voted 1 year, 12 months agoLeDarius3762
Most Recent 1 year, 9 months agofouserd
2 years agomouettespaghetti
2 years ago