Which of the following security policies can be implemented in order to prevent this situation?

IT suspects that other people are frequently making changes to a computer when a user
leaves their desk. Which of the following security policies can be implemented in order to
prevent this situation?

IT suspects that other people are frequently making changes to a computer when a user
leaves their desk. Which of the following security policies can be implemented in order to
prevent this situation?

A.
Auto-lock

B.
Password complexity

C.
Change the default username

D.
Disable the guest account

Explanation:

Reference:
http://www.inf.aber.ac.uk/advisory/faq/156



Leave a Reply 2

Your email address will not be published. Required fields are marked *


SDG

SDG

Auto-lock, a.k.a screensaver lock.

Jamaul

Jamaul

Shut up white boi