Felix Olowononi

54%
Flag icon
Spoofing attacks typically change data to impersonate another system or person. MAC spoofing attacks change the source MAC address and IP spoofing attacks change the source IP address.
CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide
Rate this book
Clear rating
Open Preview