You are a desktop technician for a small office. You suspect that a user has opened their desktop PC case and made unauthorized changes to the device's hardware. Which of the following can be configured to identify this in the future?
Mobile Devices | |
Networking | |
Hardware | |
Virtualization and Cloud Computing | |
Hardware and Network Troubleshooting |