A company brings in contractors several times a year to perform inventory, and the contractors use company-supplied laptops. The company’s security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory.
Which of the following BEST enforces this policy?
A. Delete the user accounts
B. Disable the user accounts
C. Restrict the user accounts
D. Reset the user accounts