You are speaking to a group of high school students in a technology workshop about network security. You are describing a protocol that uses public-key cryptography to authenticate between a local computer and a remote computer. Of the following, what security protocol are you describing? A. FTP B. HTML C. SSH D. TCP/IP Solution C. SSH, or Secure Shell, is a network protocol that allows data to be exchanged using a secure channel between two network hosts..