Preventing Contractor Login Access after Inventory | CompTIA A+ Core 2

Best Practice for Enforcing Security Policy | Contractor Laptop Access

Question

A company brings in contractors several times a year to perform inventory, and the contractors use company-supplied laptops.

The company's security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory.

Which of the following BEST enforces this policy?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

B.

The best option to enforce the security policy in this scenario would be to disable the user accounts of the contractors once they have completed the inventory.

Explanation:

Option A, which is to delete the user accounts, is not a recommended approach as it would erase all user data and settings, including any system customizations or preferences made by the contractors. This would require the company to reconfigure the laptops every time contractors come in to perform inventory, which is not only time-consuming but also costly.

Option B, disabling user accounts, is a more appropriate solution as it temporarily blocks contractors' access to the laptops until the next inventory. Disabling a user account means that the account remains on the system, but the user can no longer log in until the account is re-enabled. This approach allows the company to preserve user data and settings and quickly restore the contractors' access to the laptops when they return for the next inventory.

Option C, restricting user accounts, refers to setting limitations on a user's account privileges or access to system resources. This option might be useful in other scenarios where a user account needs to be closely monitored or controlled, but it does not align with the current security policy of denying access to contractors after they have completed the inventory.

Option D, resetting user accounts, means that the account is reverted to its default state, and any changes made by the contractors are erased. This option is not suitable as it would remove all data and settings, making it impractical for contractors to use the laptops to perform their work during subsequent visits.

Therefore, disabling user accounts is the best option to enforce the company's security policy in this scenario.