You are a desktop technician for a small office. You suspect that a user has opened their desktop PC case and made unauthorized changes to the device's hardware. Which of the following can be configured to identify this in the future?

  • None of the above
  • Host Intrusion Prevention
  • Host Intrusion Detection
  • Chassis Intrusion Detection

Your Score:
Mobile Devices
Networking
Hardware
Virtualization and Cloud Computing
Hardware and Network Troubleshooting
CompTIA A+ 220-1101
  • Mobile Devices
  • Networking
  • Hardware
    • This question is filed here
  • Virtualization and Cloud Computing
  • Hardware and Network Troubleshooting