Effective resource management: a. Locks out unauthorized access and can work to prevent changes to resources by internal users not qualified or authorized to have access. b. Applies read-only access to all folders for all users, with the exception of administrators and the organization's management team. c. Enables a security administrator to control user and resource access from individual machines rather than from a central location. d. Dictates that guest users be placed in a secure network, isolated from the production network by firewall barriers.