MCQOPTIONS
Saved Bookmarks
| 1. |
Which of the following is an example of physical layer vulnerability? |
| A. | MAC Address Spoofing |
| B. | Route spoofing |
| C. | Weak or non-existent authentication |
| D. | Keystroke & Other Input Logging |
| Answer» E. | |