Which of the following strategies can be used to defeat detection by a network-based IDS application?
Which one of the following attacks will pass through a network layer intrusion detection system undetected?