Que: Which of the following is an example of physical layer vulnerability?

a. MAC Address Spoofing
b. Physical Theft of Data
c. Route spoofing
d. Weak or non-existent authentication
Answer: Physical Theft of Data

Leave a Comment