IT suspects that other people are frequently making changes to a computer when a user leaves
their desk. Which of the following security policies can be implemented in order to prevent this
situation?

A.
Auto-lock
B.
Password complexity
C.
Change the default username
D.
Disable the guest account
Explanation:
http://www.inf.aber.ac.uk/advisory/faq/156