You changed the MAC address of a laptop to gain access to a network.
A. spoofing
B. brute force
C. man-in-the-middle
D. a botnet
Answer: A. spoofing
Computer Science & Information Technology
You might also like to view...
Outline view displays the overall hierarchy of parts in a document
Indicate whether the statement is true or false
Computer Science & Information Technology
Base class methods with this level of access cannot be called from derived classes.
a. Private b. Public c. Protected d. None of the above
Computer Science & Information Technology