A security architect is designing a remote access solution for a business partner. The business partner needs
to access one Linux server at the company. The business partner wants to avoid managing a password for
authentication and additional software installation. Which of the following should the architect recommend?
A. Soft token
B. Smart card
C. CSR
D. SSH key
to access one Linux server at the company. The business partner wants to avoid managing a password for
authentication and additional software installation. Which of the following should the architect recommend?
A. Soft token
B. Smart card
C. CSR
D. SSH key