Meeker wrote: I am doing some Transcender tests and I do not agree with the answer. The question states that an employee leaves and is replaced by someone else. That new person needs access to the same resources and files. This task must be accomplished as quick as possible without there being any unauthorised access. The possible answers are disable, lock, delete or rename the account. Transcender thinks its disable, I think its rename. If the new user takes this account with permission from the administrator, there is no unauthorised access. Which is right?