a. Route spoofing |
b. Identity & Resource ID Vulnerability |
c. IP Address Spoofing |
d. Weak or non-existent authentication |
Answer: Weak or non-existent authentication |
a. Route spoofing |
b. Identity & Resource ID Vulnerability |
c. IP Address Spoofing |
d. Weak or non-existent authentication |
Answer: Weak or non-existent authentication |