Define the following key terms from this chapter, and check your answers in the glossary:
amplification attack
RS
RA
NS
NA
eavesdropping
man-in-the-middle attack
spoofing
EUI-64