Question
a.
Physical theft of data & hardware
b.
Physical damage or destruction of data & hardware
c.
Unauthorized network access
d.
Keystroke & Other Input Logging
Posted under Cyber Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Which of the following is not physical layer vulnerability?
Similar Questions
Discover Related MCQs
Q. In __________________ layer, vulnerabilities are directly associated with physical access to networks and hardware.
View solution
Q. Loss of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer.
View solution
Q. Which of the following is not a vulnerability of the data-link layer?
View solution
Q. ____________ is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls.
View solution
Q. ________________may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN.
View solution
Q. Which of the following is not a vulnerability of the network layer?
View solution
Q. Which of the following is an example of physical layer vulnerability?
View solution
Q. Which of the following is an example of data-link layer vulnerability?
View solution
Q. Which of the following is an example of network layer vulnerability?
View solution
Q. Which of the following is not a transport layer vulnerability?
View solution
Q. Which of the following is not session layer vulnerability?
View solution
Q. Failed sessions allow brute-force attacks on access credentials. This type of attacks are done in which layer of the OSI model?
View solution
Q. Transmission mechanisms can be subject to spoofing & attacks based on skilled modified packets.
View solution
Q. Which of the following is not an example of presentation layer issues?
View solution
Q. Which of the following is not a vulnerability of the application layer?
View solution
Q. Which of the following is an example of Transport layer vulnerability?
View solution
Q. Which of the following is an example of session layer vulnerability?
View solution
Q. Which of the following is an example of presentation layer vulnerability?
View solution
Q. Which of the following is an example of application layer vulnerability?
View solution
Q. TCP/IP is extensively used model for the World Wide Web for providing network communications which are composed of 4 layers that work together.
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cyber Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!