You are a desktop technician for a small office. You suspect that a user has opened their desktop PC case and made unauthorized changes to the device's hardware. Which of the following can be configured to identify this in the future?
Host Intrusion Prevention
Chassis Intrusion Detection
None of the above
Host Intrusion Detection
|Virtualization and Cloud Computing|
|Hardware and Network Troubleshooting|