1.

Which of the following is an example of physical layer vulnerability?(a) MAC Address Spoofing(b) Route spoofing(c) Weak or non-existent authentication(d) Keystroke & Other Input LoggingThe question was posed to me in semester exam.My question is from Network Models in chapter Understanding Network Models for Security of Cyber Security

Answer»

Correct answer is (d) Keystroke & Other Input Logging

To elaborate: Keystroke & other input logging is an example of physical LAYER VULNERABILITY. Other such physical layer vulnerabilities are unauthorized NETWORK access, DAMAGE or destruction of data & hardware and keystroke & Other Input Logging.



Discussion

No Comment Found

Related InterviewSolutions