Which of the following is an example of physical layer vulnerability?
- MAC Address Spoofing
- Physical Theft of Data
- Route spoofing
- Weak or non-existent authentication
Answer: b
Explanation: Physical theft of data is an example of physical layer vulnerability. Other such issues are unauthorized network access, damage or destruction of data & hardware and keystroke & Other Input Logging.