The correct answer is:
(b) Physical Theft of Data
Explanation: Physical layer vulnerabilities relate to the actual hardware or physical aspects of a network. "Physical Theft of Data" is an example of a physical layer vulnerability because it involves physically stealing devices (such as hard drives, network cables, or network equipment) that contain sensitive data. This kind of vulnerability is directly related to the physical infrastructure of a network.
Here’s why the other options are not correct for the physical layer:
- (a) MAC Address Spoofing: This is a Layer 2 (Data Link Layer) issue, where attackers manipulate MAC addresses to impersonate other devices on a network.
- (c) Route spoofing: This is a Layer 3 (Network Layer) issue, where attackers manipulate routing information to mislead the network about the correct paths.
- (d) Weak or non-existent authentication: This is more of a security issue related to multiple layers, including the Application or Transport Layers, not specifically the Physical Layer.
Therefore, Physical Theft of Data is the correct example of a physical layer vulnerability.