Mark is a security analyst working at a consulting firm. He is investigating some unusual Kerberos server performance. Late in the evening after most employees have gone home, the Kerberos server shows a sudden rise in activity. Mark notes, however, a team of developers has started working late, but they report no issues on their end. What does Mark believe is causing the server's activity surge