Which of the following settings can Jane, the network administrator, implement in the computer lab
to ensure that user credentials cannot be captured by the next computer user?
A.
Implement full drive encryption on all lab computers.
B.
Reverse the computer to its original state upon reboot.
C.
Do not display last username in logon screen.
D.
Deploy privacy screens on all lab computers.