Automated mechanisms exist to prohibit the use of cached authenticators after organization-defined time period.
Does the organization use automated mechanisms to prohibit the use of cached authenticators after organization-defined time period?