πŸ“Š Computer Architecture and Organization
Q. Which of the following is an example of physical layer vulnerability?
  • (A) mac address spoofing
  • (B) physical theft of data
  • (C) route spoofing
  • (D) weak or non-existent authentication
πŸ’¬ Discuss
βœ… Correct Answer: (B) physical theft of data

Explanation: physical theft of data is an example of physical layer vulnerability. other such issues are unauthorized network access, damage or destruction of data & hardware and keystroke & other input logging.


Explanation by: Mr. Dubey
physical theft of data is an example of physical layer vulnerability. other such issues are unauthorized network access, damage or destruction of data & hardware and keystroke & other input logging.

πŸ’¬ Discussion

πŸ“Š Question Analytics

πŸ‘οΈ
394
Total Visits
πŸ“½οΈ
2 y ago
Published
πŸŽ–οΈ
Mr. Dubey
Publisher
πŸ“ˆ
80%
Success Rate