

MCQOPTIONS
Saved Bookmarks
1. |
Which of the following is an example of physical layer vulnerability? |
A. | MAC Address Spoofing |
B. | Route spoofing |
C. | Weak or non-existent authentication |
D. | Keystroke & Other Input Logging |
Answer» E. | |