An administrator notices that several users are logging in from suspicious IP addresses. After speaking with the users, the administrator determines that the employees were not logging in from those IP addresses and resets the affected users’ passwords. Which of the following should the administrator implement to prevent this type of attack from succeeding in the future?
oluabi.salami
Highly Voted 1 year, 1 month agoSh_ade
Most Recent 2 months, 4 weeks agoPiyabhola
3 months, 1 week agoIT_dude_in_training
3 months, 1 week agoJackExam2025
4 months, 1 week agoHasss
4 months, 3 weeks agoEtc_Shadow28000
9 months agodbrowndiver
9 months agoemputu22
1 year, 1 month agoYoez
1 year, 1 month ago