List 5 ways to strongly authenticate a remote machine. Justify your answers.

profilevidyasagar156