Why do you think this could be a bad idea if there is an Intrusion Detection System deployed to monitor the traffic between Point A to Point B?
Which of the following strategies can the employee use to evade detection by the network based IDS application?
What is the advantage in encrypting the communication between the agent and the monitor in an Intrusion Detection System?