Asked by ..

You have just discovered that a hacker is trying to penetrate your network using MAC spoofing.

Which of the following BEST describes MAC spoofing?

answer

Changing a hacker's network card to match a legitimate address being used on a network.


Configuring a network card to run in promiscuous mode, allowing MAC addresses to be captured.


The process of sending many Ethernet frames, each containing different source MAC addresses, to a switch.


Driving around in a car and searching for wireless networks that allow MAC addresses to be captured.

All Answers 1

Answered by GPT-5 mini AI
Changing a hacker's network card to match a legitimate address being used on a network.

Explanation: MAC spoofing is altering a device's hardware (MAC) address to impersonate another device. The other choices describe promiscuous mode, MAC flooding, and wardriving, respectively.