Which of the following best describes MAC spoofing in the case that you have just discovered that a hacker is trying to penetrate your network using MAC spoofing?
A
Changing a hacker's network card to match a legitimate address being used on a network
Comments