List 5 ways to strongly authenticate a remote machine. Justify your answers.List three distinct technologies for protecting files from tampering,…Uncategorized List 5 ways to strongly authenticate a remote machine. Justify your answers. List three distinct technologies for protecting files from tampering, and justify your answers.