Which of the following security controls indicates unauthorized hardware modifications?
A. Biometric authentication
B. Media device sanitization
C. Change management policy
D. Tamper-evident seals
A. Biometric authentication
B. Media device sanitization
C. Change management policy
D. Tamper-evident seals