While performing surveillance activities, an attacker determines that an organization is using 802.1X to secure
LAN access. Which of the following attack mechanisms can the attacker utilize to bypass the identified network
802.1x restricts access based on MAC addresses. However, MAC addresses can be spoofed.