networking 77
·Class discussion on network security should be comprehensive to include MAC spoofing and how implementing proper subnetting helps to secure a network.
·Break up into groups and discuss whether it is ever possible to truly make an impenetrable network.
oHave the groups present their findings in a debate format