VMware 2V0-16.25 Question Answer
During a recent audit, it was determined that a group of users may have been compromised. These users should not have access to any VMware vCenter resources while an investigation is underway. All the affected users have been placed into a SUSPECT_USERS group.
Which step is required to ensure that the suspect users will never have access to resources in vCenter?