MCQOPTIONS
Saved Bookmarks
| 1. |
Which of the following is an example of network layer vulnerability? |
| A. | mac address spoofing |
| B. | physical theft of data |
| C. | route spoofing |
| D. | weak or non-existent authentication |
| Answer» D. weak or non-existent authentication | |