# Pastebin ELuIEmnB a) When authentication is used, a method is available that does not exclusively rely on any one of the following: b) When authentication is used, users can authenticate using a method that does not rely on: