An administrator notices that several users are logging in from suspicious IP addresses. After speaking with the users, the administrator determines that the employees were not logging in from those IP addresses and resets the affected users’ passwords. Which of the following should the administrator implement to prevent this type of attack from succeeding in the future?
oluabi.salami
Highly Voted 11 months, 3 weeks agoSh_ade
Most Recent 1 month agoPiyabhola
1 month, 1 week agoIT_dude_in_training
1 month, 2 weeks agoJackExam2025
2 months, 2 weeks agoHasss
2 months, 3 weeks agoEtc_Shadow28000
7 months, 1 week agodbrowndiver
7 months, 1 week agoemputu22
11 months, 4 weeks agoYoez
12 months ago