πŸ“Š Computer Architecture and Organization
Q. Which of the following is an example of physical layer vulnerability?
  • (A) mac address spoofing
  • (B) route spoofing
  • (C) weak or non-existent authentication
  • (D) keystroke & other input logging
πŸ’¬ Discuss
βœ… Correct Answer: (D) keystroke & other input logging

Explanation: keystroke & other input logging is an example of physical layer vulnerability. other such physical layer vulnerabilities are unauthorized network access, damage or destruction of data & hardware and keystroke & other input logging.


Explanation by: Vinay
keystroke & other input logging is an example of physical layer vulnerability. other such physical layer vulnerabilities are unauthorized network access, damage or destruction of data & hardware and keystroke & other input logging.

πŸ’¬ Discussion

πŸ“Š Question Analytics

πŸ‘οΈ
478
Total Visits
πŸ“½οΈ
1 y ago
Published
πŸŽ–οΈ
Vinay
Publisher
πŸ“ˆ
95%
Success Rate