A system administrator wants to move away from interactive password-based logins. Which technology should the system administrator use to accomplish this goal?
A. Telnet and PGP
B. Secure shell with Public Key Authentication
C. rlogin with TCP Wrappers
D. Console access using IPSec