Skip to content

Which of the following is an example of physical layer vulnerability?

Which of the following is an example of physical layer vulnerability?

  • MAC Address Spoofing
  • Route spoofing
  • Weak or non-existent authentication
  • Keystroke & Other Input Logging

Question was not answered

Answer: d

Explanation: Keystroke & other input logging is an example of physical layer vulnerability. Other such physical layer vulnerabilities are unauthorized network access, damage or destruction of data & hardware and keystroke & Other Input Logging.

Leave a Reply

Your email address will not be published. Required fields are marked *

ULLU Web Series New: Watch this Bold Web Series by putting the latch of the room Rani Pari Web Series List Watch Online Charmsukh Tapan Web Series: देवर और भाभी ने किया जमकर रोमांस Romantic Web Series: Enjoy this web series alone, full of bold scenes Top 10 Current Affairs In Hindi TOP 10 FACT You Have to Know
%d bloggers like this: