A security administrator has been assigned to review the security posture of the standard corporate system
image for virtual machines. The security administrator conducts a thorough review of the system logs,
installation procedures, and network configuration of the VM image. Upon reviewing the access logs and user
accounts, the security administrator determines that several accounts will not be used in production. Which of
the following would correct the deficiencies?
Mandatory access controls
Disable remote login