header bg

Question:

Which of the following best describes MAC spoofing in the case that you have just discovered that a hacker is trying to penetrate your network using MAC spoofing?

A Changing a hacker's network card to match a legitimate address being used on a network
Explaination