1.

Which_of_the_following_is_an_example_of_physical_layer_vulnerability?$

A. MAC Address Spoofing
B. Physical Theft of Data
C. Route spoofing
D. Weak or non-existent authentication
Answer» C. Route spoofing


Discussion

No Comment Found