McqMate
Q. |
Which of the following is an example of physical layer vulnerability? |
A. | mac address spoofing |
B. | route spoofing |
C. | weak or non-existent authentication |
D. | keystroke & other input logging |
Answer» D. keystroke & other input logging | |
Explanation: keystroke & other input logging is an example of physical layer vulnerability. other such physical layer vulnerabilities are unauthorized network access, damage or destruction of data & hardware and keystroke & other input logging. |
View all MCQs in
Computer Architecture and OrganizationNo comments yet