Discussion: Authenticate A Remote Machine
• List 5 ways to strongly authenticate a remote machine. Justify your answers.
• List three distinct technologies for protecting files from tampering, and justify your answers.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.