Kyle Belote

54%
Flag icon
However, it’s possible to use software methods to associate a different MAC address to the NIC in a MAC spoofing attack.
CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide
Rate this book
Clear rating
Open Preview