TECHNOLOGY
Discussion
In NOT less than 150 words, respond to the following discussion questions:
- List 5 ways to strongly authenticate a remote machine. Justify your answers.
- List three distinct technologies for protecting files from tampering, and justify your answers.
Please respond by making constructive responses or by raising other questions that will promote further discussion and learning by all of us.
Answer preview
- 5 Ways of authenticating a remote machine
- A device can be validated using an application such as a Microsoft chap which does protect the device’s password from public use by encrypting it. In every time the machine is in use the user is always identified hence unauthorized people are kept off (McGarvey, 2003).
There is the use of a CHAP which in broad refers to Challenge Handshake Authentication Protocol. It does help in…
(350 words)