A user suspects someone has been accessing a home network without permission by spoofing the MAC address of an authorized system.
While attempting to determine if an authorized user is logged into the home network, the user reviews the wireless router, which shows the following table for systems that are currently on the home network.
Which of the following should be the NEXT step to determine if there is an unauthorized user on the network?
Click on the arrows to vote for the correct answer
A. B. C. D.B.