Which network environment is suitable for a Media Access Control (MAC) address spoofing attack?
- on a WAN connection
- inside an internal network
- between an organization network and ISP
- within the cloud
Explanation: Media Access Control (MAC) address spoofing attacks are used when threat actors have access to the internal network. Threat actors alter the MAC address of their host to match the known MAC address of a target host.
Exam with this question: IoT Security 1.1 Chapter 4 Quiz Answers
Please login or Register to submit your answer