Which of the following would not be useful when investigating whether authentication had anything to do with the failure?