in Education by
Which of the following is an example of physical layer vulnerability? (a) MAC Address Spoofing (b) Route spoofing (c) Weak or non-existent authentication (d) Keystroke & Other Input Logging The question was posed to me in semester exam. My question is from Network Models in chapter Understanding Network Models for Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
Correct answer is (d) Keystroke & Other Input Logging To elaborate: Keystroke & other input logging is an example of physical layer vulnerability. Other such physical layer vulnerabilities are unauthorized network access, damage or destruction of data & hardware and keystroke & Other Input Logging.

Related questions

0 votes
    Which of the following is an example of physical layer vulnerability? (a) MAC Address Spoofing (b) Physical Theft ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is not physical layer vulnerability? (a) Physical theft of data & hardware (b) Physical ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of data-link layer vulnerability? (a) MAC Address Spoofing (b) Physical ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of network layer vulnerability? (a) MAC Address Spoofing (b) Physical Theft ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of data-link layer vulnerability? (a) Physical Theft of Data (b) VLAN ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of Transport layer vulnerability? (a) weak or non-existent mechanisms for ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of session layer vulnerability? (a) weak or non-existent mechanisms for ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of presentation layer vulnerability? (a) weak or non-existent mechanisms for ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of application layer vulnerability? (a) Cryptographic flaws lead to the privacy ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a vulnerability of the data-link layer? (a) MAC Address Spoofing (b) VLAN ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a vulnerability of the network layer? (a) Route spoofing (b) Identity & Resource ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a transport layer vulnerability? (a) Mishandling of undefined, poorly defined (b) The ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is not session layer vulnerability? (a) Mishandling of undefined, poorly defined (b) Spoofing and ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a vulnerability of the application layer? (a) Application design bugs may bypass security ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    ____________ is data-link layer vulnerability where stations are forced to make direct communication with another station by ... and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
...