Q.

Which of the following is an example of physical layer vulnerability?

A. mac address spoofing
B. route spoofing
C. weak or non-existent authentication
D. keystroke & other input logging
Answer» D. keystroke & other input logging
Explanation: keystroke & other input logging is an example of physical layer vulnerability. other such physical layer vulnerabilities are unauthorized network access, damage or destruction of data & hardware and keystroke & other input logging.
1k
0
Do you find this helpful?
13

Discussion

No comments yet