Which of the following is an example of physical layer vulnerability?
- MAC Address Spoofing
- Route spoofing
- Weak or non-existent authentication
- Keystroke & Other Input Logging
Question was not answered
Answer: d
Explanation: Keystroke & other input logging is an example of physical layer vulnerability. Other such physical layer vulnerabilities are unauthorized network access, damage or destruction of data & hardware and keystroke & Other Input Logging.