Of the following, what are two good ways to protect the computer? (Select the two best answers.)

A. Verify that the guest account is disabled.
B. Rename and password protect the administrator account.
C. Delete the administrator account.
D. Remove password policies.

A and B. Verifying that the guest account, and any other unnecessary accounts, is disabled and renaming a password protecting the administrator account are good ways to protect the computer.

Computer Science & Information Technology

You might also like to view...

FIPS 186 -3 incorporates digital signature algorithms based on RSA and on __________ cryptography.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which rule condition identifies software by file location?

A. publisher B. path C. file hash D. certificate

Computer Science & Information Technology