While reviewing switch logs, a network analyst notices many failed logon attempts followed by a successful logon from an unknown IP address.
Which of the following hardening techniques should be utilized to prevent unauthorized access?
A . Avoiding common passwords
B . File hashing
C . Disabling unused IP ports
D . Using secure protocols
Answer: A