Respuesta :

Answer:

Authentication

Explanation:

Remote access connections must be secured using authentication and encryption software. Authentication software confirms the identity of the user or computer system.