TELECOMMUNICATIONS SYSTEMS
NETWORK ARCHITECTURE
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Physical theft of data & hardware
|
|
Physical damage or destruction of data & hardware
|
|
Unauthorized network access
|
|
Keystroke & Other Input Logging
|
Detailed explanation-1: -Which of the following is not physical layer vulnerability? Explanation: Unauthorized network access is not an example of physical layer vulnerability. The rest three – Physical theft of data & hardware, damage or destruction of data & hardware and keystroke & Other Input Logging are physical layer vulnerabilities.
Detailed explanation-2: -Which is not a function of the physical layer: providing error-free transmission of data.
Detailed explanation-3: -6. Which of the following is not a vulnerability of the application layer? Explanation: Application design flaws may bypass security controls, inadequate security controls as well as logical bugs in programs may be by chance or on purpose be used for crashing programs.
Detailed explanation-4: -Explanation : Flood comes under natural disaster which is a threat to any information and not acts as a vulnerability to any system.
Detailed explanation-5: -Physical layer is the lowest layer of the OSI reference model. It is responsible for sending bits from one computer to another. This layer is not concerned with the meaning of the bits and deals with the setup of physical connection to the network and with transmission and reception of signals.