Which of the following is an example of data-link layer vulnerability?
(a) Physical Theft of Data
(b) VLAN circumvention
(c) Route spoofing
(d) Weak or non-existent authentication
I got this question in an interview for internship.
My question is from Network Models in section Understanding Network Models for Security of Cyber Security