A cybersecurity analyst traced the source of an attack to compromised user credentials. Log analysis revealed that
the attacker successfully authenticated from an unauthorized foreign country. Management asked the security analyst to research and implement a solution to help mitigate attacks based on compromised passwords. Which of the following should the analyst impl
ement?
A. Self-service password reset
B. Single sign-on
C. Context-based authentication
D. Password complexity
Explanation: