chloeg6771 chloeg6771 18-11-2022 Computers and Technology contestada verifying the identity of the person or device attempting to access the system is an example of group of answer choices threat monitoring. authentication. authorization. identification.