which of the following r most likely to be considered forms of autheorisation? sel 2 a. verify a user's fingerprint pattern b. verify a user's pswd c. allowing a user to access a specific file d. logging a verified user's file access e. assigning a tole to be a verified user. whic of the following is consdered accounting in the AAA model? a. grating a user persmission to modify a file b. using MFA to verufy a user's id c. restricting a user from viewing a file d. logging the date and time a user logged in to the system. which of the followin is not an example of multifactor authenitcation? a. swiping a key card and then doing a retine scan b. entering a password and then tapping a notification on your phjone c. doing a retina scan and then doig a fingerprint scan d, swiping a key card and then entering a PIN. your copmpany implements doorlocks hat require a badge to be scanned and a pass code to be entered. what is this an example of? sel 2 a. user training b. user awareness c. physical access ctrl d. multi-factor authentcation e. AAA f. biometrics. whic of the following terms refers tpo yej real possibility thatt a potential wekaness is tale advanage of to attackaa system? a. threat b. vulnerability c. exploit d. mitigation technique. which part of the CIA triad ensures tha systems r running & accessible by users? a.confidentiality b. integrity c. authentication d. availability e. authorisation f. accounting.