An administrator notices that several users are logging in from suspicious IP addresses. After speaking with the users, the administrator determines that the employees were not logging in from those IP addresses and resets the affected users’ passwords. Which of the following should the administrator implement to prevent this type of attack from succeeding in the future?
oluabi.salami
Highly Voted 11 months agoSh_ade
Most Recent 1 week, 6 days agoPiyabhola
3 weeks, 2 days agoIT_dude_in_training
3 weeks, 6 days agoJackExam2025
1 month, 3 weeks agoHasss
2 months agoEtc_Shadow28000
6 months, 2 weeks agodbrowndiver
6 months, 2 weeks agoemputu22
11 months, 1 week agoYoez
11 months, 1 week ago