Which of the following is an example of physical layer vulnerability?
(a) MAC Address Spoofing
(b) Route spoofing
(c) Weak or non-existent authentication
(d) Keystroke & Other Input Logging
The question was posed to me in semester exam.
My question is from Network Models in chapter Understanding Network Models for Security of Cyber Security
Select the correct answer from above options
Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,