Every device connected to a network must have a MAC address.

IP v6 addresses are made up of bits.

the mac address of a device can make it difficult to track the origin of a network attack.

Mac address spoofing is often used in attacks to intercept network traffic.

The first three groups in a MAC address represent the of the device.

Mac address spoofing can be used to security measures and gain unauthorized access to a network.

Using a IP address provides an additional layer of security by hiding devices from the public internet.

An IPv4 address consists of octets.

The use of IP addresses helps conserve IPv4 address space.

A IP address is only accessible within a local network.