1.

Which of the following is an example of physical layer vulnerability?

A. MAC Address Spoofing
B. Route spoofing
C. Weak or non-existent authentication
D. Keystroke & Other Input Logging
Answer» E.


Discussion

No Comment Found