A cyber security administrator receives a list of IPs that have been reported as attempting to
access the network. To identify any possible successful attempts across the enterprise, which of
the following should be implemented?

A.
Monitor authentication logs
B.
Disable unnecessary accounts
C.
Time of day restrictions
D.
Separation of duties