Over the past several months, Tom, who has access to sensitive company information, has logged on to computers in other departments and left them without logging off. You have discussed the matter with him, but the problem continues to occur. You're concerned that someone could access these sensitive resources easily. What's the best way to solve this problem?

a: Ensure that all computers Tom is logging on to have screen savers set to lock the computer after 15 minutes of inactivity.

b: Specify which computers Tom can log on to in the domain by using the Log On To option in his account's properties.

c: Move Tom's account and computer to another domain, thereby making it impossible for him to log on to computers that are members of a different domain.

d: Disable local logon for Tom's account on all computers except for Tom's.


b: Specify which computers Tom can log on to in the domain by using the Log On To option in his account's properties.

Computer Science & Information Technology

You might also like to view...

In Office 2013, Access databases are saved with ____ extensions.

A. .acc B. .accd C. .accdb D. .dba

Computer Science & Information Technology

A(n) ________ is a reference placed at the bottom of the page and contains a number reference

Fill in the blank(s) with correct word

Computer Science & Information Technology

A(n) ________ is a series of rows and columns that organize data in your document

Fill in the blank(s) with correct word

Computer Science & Information Technology

________ view is designed to provide the most space possible for typing

Fill in the blank(s) with correct word

Computer Science & Information Technology