15. Which of the following issues must be addressed in any remote access method or technology? (hoose two.) (A) Encryption (B) Loop protection (C) Authentication (D) Traffic flooding