IT suspects that other people are frequently making changes to a computer when a user leaves their desk. Which of the following security policies can be implemented in order to prevent this situation?
A. Auto-lock
B. Password complexity
C. Change the default username
D. Disable the guest account