Que: Which of the following is an example of network layer vulnerability?

a. MAC Address Spoofing
b. Physical Theft of Data
c. Route spoofing
d. Weak or non-existent authentication
Answer: Route spoofing

Leave a Comment