IT suspects that other people are frequently making changes to a computer when a user leaves their
desk. Which of the following security policies can be implemented in order to prevent this situation?
A.
Auto-lock
B.
Password complexity
C.
Change the default username
D.
Disable the guest account