A technician wants to have the ability to transfer files from home to the company’s network on a regular basis.
Which of the following is a remote access protocol the technician can utilize to bypass interactive user authentication by using a list of known host public keys?
A . FTP
B . SCP
C . TFTP
D . Telnet
Answer: B