a. MAC Address Spoofing |
b. Physical Theft of Data |
c. Route spoofing |
d. Weak or non-existent authentication |
Answer: Physical Theft of Data |
a. MAC Address Spoofing |
b. Physical Theft of Data |
c. Route spoofing |
d. Weak or non-existent authentication |
Answer: Physical Theft of Data |