You are a desktop technician for a small office. You suspect that a user has opened their desktop PC case and made unauthorized changes to the device's hardware. Which of the following can be configured to identify this in the future?

A+ 220-901 Objectives

  • Hardware
    • This question is filed here
  • Networking
  • Mobile Devices
  • Hardware and Network Troubleshooting
Report Error