Saved Bookmarks
| 1. |
Which of the following is an example of physical layer vulnerability?(a) MAC Address Spoofing(b) Route spoofing(c) Weak or non-existent authentication(d) Keystroke & Other Input LoggingThe question was posed to me in semester exam.My question is from Network Models in chapter Understanding Network Models for Security of Cyber Security |
|
Answer» Correct answer is (d) Keystroke & Other Input Logging |
|