Which of the following settings can Jane, the network administrator, implement in the computer lab to ensure that user credentials cannot be captured by the next computer user?
After a production outage, which of the following documents contains detailed information on the order in which the system should be restored to service?