Q. Which of the following is an example of physical layer vulnerability? (Solved)
1. mac address spoofing
2. route spoofing
3. weak or non-existent authentication
4. keystroke & other input logging
- d. keystroke & other input logging
1. mac address spoofing
2. route spoofing
3. weak or non-existent authentication
4. keystroke & other input logging