+1 vote
204 views
in Cyber Security by (69.5k points)
Which of the following is an example of physical layer vulnerability?

(a) MAC Address Spoofing

(b) Physical Theft of Data

(c) Route spoofing

(d) Weak or non-existent authentication

I have been asked this question at a job interview.

Asked question is from Network Models in division Understanding Network Models for Security of Cyber Security

1 Answer

0 votes
by (65.4k points)

The correct answer is:

(b) Physical Theft of Data

Explanation: Physical layer vulnerabilities relate to the actual hardware or physical aspects of a network. "Physical Theft of Data" is an example of a physical layer vulnerability because it involves physically stealing devices (such as hard drives, network cables, or network equipment) that contain sensitive data. This kind of vulnerability is directly related to the physical infrastructure of a network.

Here’s why the other options are not correct for the physical layer:

  • (a) MAC Address Spoofing: This is a Layer 2 (Data Link Layer) issue, where attackers manipulate MAC addresses to impersonate other devices on a network.
  • (c) Route spoofing: This is a Layer 3 (Network Layer) issue, where attackers manipulate routing information to mislead the network about the correct paths.
  • (d) Weak or non-existent authentication: This is more of a security issue related to multiple layers, including the Application or Transport Layers, not specifically the Physical Layer.

Therefore, Physical Theft of Data is the correct example of a physical layer vulnerability.

Related questions

Welcome to TalkJarvis QnA, a question-answer community website for the people by the people. On TalkJarvis QnA you can ask your doubts, curiosity, questions and whatever going in your mind either related to studies or others. Experts and people from different fields will answer.

Most popular tags

biology – class 12 biology – class 11 construction & building materials chemistry – class 12 electronic devices & circuits network theory data structures & algorithms ii cell biology ic engine insurance finance money computational fluid dynamics engineering physics i discrete mathematics chemistry – class 11 aerodynamics casting-forming-welding i engineering mathematics operating system casting-forming-welding ii engineering drawing mysql engineering geology digital circuits wireless mobile energy management electrical measurements digital communications cyber security analytical instrumentation embedded systems electric drives cytogenetics advanced machining computer fundamentals life sciences basic civil engineering iot design of electrical machines physics – class 12 applied chemistry dairy engineering basic chemical engineering cloud computing microprocessor bioinformatics aircraft design aircraft maintenance software engineering drug biotechnology digital signal processing biochemistry data structures & algorithms i automotive engine design avionics engineering material & metallurgy energy engineering cognitive radio unix electrical machines biomedical instrumentation object oriented programming electromagnetic theory power electronics analog communications bioprocess engineering civil engineering drawing engineering metrology physics – class 11 mathematics – class 12 engineering chemistry i basic electrical engineering unit processes mongodb signals and systems cryptograph & network security hadoop mathematics – class 11 engineering physics ii html control systems engineering mechanics antennas analog circuits computer network java sql server javascript concrete technology chemical process calculation artificial intelligence design of steel structures c++ database management computer architecture engineering chemistry ii corrosion engineering chemical technology dc machines
...