Could the size of a network make spoofing an easier way to gain access to a system?

Posted Date: