MAC ________ involves an unauthorized device having its MAC address purposefully changed such that the device appears to be a legitimate user of the network.
A) sparking
B) spoofing
C) moofing
D) spatting
Question 2
Twitter is an example of a microblog that limits an individual posting to 140 characters. What is the individual posting called?
A) a buzz
B) a chickadee
C) a flutter
D) a tweet