A security architect is designing a remote access solution for a business partner. The business partner needs to access one Linux server at the company. The business partner wants to avoid managing a password for authentication and additional software installation. Which of the following should the architect recommend?
ApplebeesWaiter1122
Highly Voted 2 years, 2 months agoLeDarius3762
Most Recent 1 year, 11 months agofouserd
2 years, 2 months agomouettespaghetti
2 years, 2 months ago