Which of the following is not physical layer vulnerability?
- Physical theft of data & hardware
- Physical damage or destruction of data & hardware
- Unauthorized network access
- Keystroke & Other Input Logging
Explanation: Unauthorized network access is not an example of physical layer vulnerability. The rest three – Physical theft of data & hardware, damage or destruction of data & hardware and keystroke & Other Input Logging are physical layer vulnerabilities.