A cyber security administrator receives a list of IPs that have been reported as attempting to access the
network. To identify any possible successful attempts across the enterprise, which of the following should be
implemented?
A.
Monitor authentication logs
B.
Disable unnecessary accounts
C.
Time of day restrictions
D.
Separation of duties