Several computers in your organization are being used from within the building after hours when the company is closed. Your manager has asked you to configure the computers to limit access to business hours.
Which of the following steps can be taken to limit access to the computers?
A. Configure logon time restrictions.
B. Set the BIOS to automatically power off the computers at closing time.
C. Disable Microsoft account resources.
D. Change the user account passwords.
Answer: A
You might also like to view...
The ___________ statement in a called function passes the value of an expression back to the calling function.
Fill in the blank(s) with the appropriate word(s).
A list or table used to create a PivotTable or PivotChart report that comes from an Excel list or external database is called ________
Fill in the blank(s) with correct word
The most common judicial challenges facing computer crime investigators include inconsistent interpretations and applications of the First, Second, and Thirteenth Amendments to emerging advancements in technology
Indicate whether the statement is true or false.
The header element includes links to other pages within a website.?
Answer the following statement true (T) or false (F)