A company's IT department is conducting an annual audit of their hardware inventory. Every piece of equipment is supposed to have a unique identifier for tracking purposes. During the audit, the IT staff discovers that several devices are missing their identifiers. What should have been used to secure the physical properties and ensure each equipment can be accurately tracked?
MAC addresses
Service tags
Asset tags
Serial numbers