1.

Which of the following is an example of physical layer vulnerability?

A. mac address spoofing
B. physical theft of data
C. route spoofing
D. weak or non-existent authentication
Answer» C. route spoofing


Discussion

No Comment Found