1.

Which of the following is an example of network layer vulnerability?

A. mac address spoofing
B. physical theft of data
C. route spoofing
D. weak or non-existent authentication
Answer» D. weak or non-existent authentication


Discussion

No Comment Found