Which of the following is an example of network layer vulnerability?
(a) MAC Address Spoofing
(b) Physical Theft of Data
(c) Route spoofing
(d) Weak or non-existent authentication
This question was addressed to me by my school principal while I was bunking the class.
My question is based upon Network Models in section Understanding Network Models for Security of Cyber Security