You changed the MAC address of a laptop to gain access to a network.

A. spoofing
B. brute force
C. man-in-the-middle
D. a botnet

Answer: A. spoofing

Computer Science & Information Technology

You might also like to view...

Outline view displays the overall hierarchy of parts in a document

Indicate whether the statement is true or false

Computer Science & Information Technology

Base class methods with this level of access cannot be called from derived classes.

a. Private b. Public c. Protected d. None of the above

Computer Science & Information Technology