Remote access connections must be secured using authentication and encryption software. ______ software confirms the identity of the user or computer system.
Remote access connections must be secured using authentication and encryption software. Authentication software confirms the identity of the user or computer system.