The security manager reports that individual systems involved in policy or security violations or incidents cannot be located quickly. The security manager notices the hostnames all appear to be randomly generated characters.
Which of the following would BEST assist the security manager identifying systems involved in security incidents?
A . Enforce port security to require system authentication
B . Implement a standardized UNC
C . Label existing systems with current hostnames
D . Forward the DHCP logs to the security manager every day
Answer: B