____________ protocol attack is done in the data-link layer.
(a) HTTP
(b) DNS
(c) TCP/IP
(d) POP
I got this question in an internship interview.
This intriguing question originated from Network Models in portion Understanding Network Models for Security of Cyber Security