Which of the following security policies can be implemented in order to prevent this situation?

IT suspects that other people are frequently making changes to a computer when a user leaves their
desk. Which of the following security policies can be implemented in order to prevent this situation?

IT suspects that other people are frequently making changes to a computer when a user leaves their
desk. Which of the following security policies can be implemented in order to prevent this situation?

A.
Auto-lock

B.
Password complexity

C.
Change the default username

D.
Disable the guest account



Leave a Reply 0

Your email address will not be published. Required fields are marked *