63.2k views
5 votes
Remote access connections must be secured using authentication and encryption software. ______ software confirms the identity of the user or computer system.

1 Answer

0 votes

Answer:

Authentication

Step-by-step explanation:

Remote access connections must be secured using authentication and encryption software. Authentication software confirms the identity of the user or computer system.

User MatijaG
by
5.8k points