You are a desktop technician for a small office. You suspect that a user has opened their desktop PC case and made unauthorized changes to the device's hardware. Which of the following can be configured to identify this in the future?
None of the above
Chassis Intrusion Detection
Host Intrusion Detection
Host Intrusion Prevention
|Virtualization and Cloud Computing|
|Hardware and Network Troubleshooting|