During a network security review, the system log indicates an unusually high number of unsuccessful login attempts. Which of the following sampling techniques is MOST appropriate for selecting a sample of user IDs for further investigation?
A. Stratified
B. Attribute
C. Monetary unit
D. Variable
A. Stratified
B. Attribute
C. Monetary unit
D. Variable