Explanation: keystroke & other input logging is an example of physical layer vulnerability. other such physical layer vulnerabilities are unauthorized network access, damage or destruction of data & hardware and keystroke & other input logging.
Q. Which of the following is an example of physical layer vulnerability?
β
Correct Answer: (D)
keystroke & other input logging
Explanation by: Vinay
keystroke & other input logging is an example of physical layer vulnerability. other such physical layer vulnerabilities are unauthorized network access, damage or destruction of data & hardware and keystroke & other input logging.
Discussion
Question Analytics
478
Total Visits
1 y ago
Published
Vinay
Publisher
95%
Success Rate