The security administrator notices a user logging into a corporate Unix server remotely as root.
Which of the following actions should the administrator take?

A.
Create a firewall rule to block SSH
B.
Delete the root account
C.
Disable remote root logins
D.
Ensure the root account has a strong password