You may be able to identify the IP addresses and machine names for the firewall, and the names of internal mail servers by:
Which of the following strategies can be used to defeat detection by a network-based IDS application?