a. MAC Address Spoofing |
b. Physical Theft of Data |
c. Route spoofing |
d. Weak or non-existent authentication |
Answer: Route spoofing |
a. MAC Address Spoofing |
b. Physical Theft of Data |
c. Route spoofing |
d. Weak or non-existent authentication |
Answer: Route spoofing |