Which of the following is an example of physical layer vulnerability?
(a) MAC Address Spoofing
(b) Physical Theft of Data
(c) Route spoofing
(d) Weak or non-existent authentication
I have been asked this question at a job interview.
Asked question is from Network Models in division Understanding Network Models for Security of Cyber Security