1.

Which of the following is an example of network layer vulnerability?

A. MAC Address Spoofing
B. Physical Theft of Data
C. Route spoofing
D. Weak or non-existent authentication
Answer» D. Weak or non-existent authentication


Discussion

No Comment Found