Which technique can an intruder use to try to evade detection by a Snort sensor?
A.
split the malicious payload over several fragments to mask the attack signature
B.
disable a sensor by exceeding the number of packets that it can fragment before
forwarding
C.
send more packet fragments than the destination host can reassemble, to disable the
host without regard to any intrusion-detection devices that might be on the network
D.
exceed the maximum number of fragments that a sensor can evaluate