Answer:
Authentication
Step-by-step explanation:
Remote access connections must be secured using authentication and encryption software. Authentication software confirms the identity of the user or computer system.
6.6m questions
8.7m answers