98.4k views
12 votes
suspect that several users are attempting to install unauthorized software. Upon researching, you discover that the attempts were unsuccessful. What tool did you implement that logged those attempts and identified the users

User Pankijs
by
3.0k points

1 Answer

10 votes
Two factor authentication? I’m not sure
User VicX
by
3.4k points