A security team is auditing a company's network logs and notices that a USB drive was previously inserted
into several of the servers. Many login attempts were then successfully performed using common login
information.
Which of the following actions should be taken to close the vulnerability? (Select two.)