verifying the identity of the person or device attempting to access the system is an example of group of answer choices threat monitoring. authentication. authorization. identification.