A network administrator needs to ensure secure local device access. Which of the following methods aligns MOST closely with best security practices for local device authentication?
Setting all devices to lock out user access after three consecutive failed login attempts.
Enabling detailed device access logging to monitor successful and unsuccessful login attempts.
Implementing a single-factor authentication with a user ID and password combination.
Enforcing passphrase use instead of traditional passwords for device login credentials.
Mandating that all user passwords must be changed on a 90-day cycle.