CompTIA Exam Questions

A cybersecurity analyst traced the source of an attack to compromised user credentials. Log analysis

A cybersecurity analyst traced the source of an attack to compromised user credentials. Log analysis revealed that

the attacker successfully authenticated from an unauthorized foreign country. Management asked the security analyst to research and implement a solution to help mitigate attacks based on compromised passwords. Which of the following should the analyst impl

ement?

A. Self-service password reset

B. Single sign-on

C. Context-based authentication

D. Password complexity

Explanation: