You are a desktop technician for a small office. You suspect that a user has opened their desktop PC case and made unauthorized changes to the device's hardware. Which of the following can be configured to identify this in the future?
Hardware | |
Networking | |
Mobile Devices | |
Hardware and Network Troubleshooting |