Over the past several months, Tom, who has access to sensitive company information, has logged on to computers in other departments and left them without logging off. You have discussed the matter with him, but the problem continues to occur. You're concerned that someone could access these sensitive resources easily. What's the best way to solve this problem?
a: Ensure that all computers Tom is logging on to have screen savers set to lock the computer after 15 minutes of inactivity.
b: Specify which computers Tom can log on to in the domain by using the Log On To option in his account's properties.
c: Move Tom's account and computer to another domain, thereby making it impossible for him to log on to computers that are members of a different domain.
d: Disable local logon for Tom's account on all computers except for Tom's.
b: Specify which computers Tom can log on to in the domain by using the Log On To option in his account's properties.
You might also like to view...
In Office 2013, Access databases are saved with ____ extensions.
A. .acc B. .accd C. .accdb D. .dba
A(n) ________ is a reference placed at the bottom of the page and contains a number reference
Fill in the blank(s) with correct word
A(n) ________ is a series of rows and columns that organize data in your document
Fill in the blank(s) with correct word
________ view is designed to provide the most space possible for typing
Fill in the blank(s) with correct word