Why do you think this could be a bad idea if there is an Intrusion Detection System deployed to monitor the traffic between point A and B?
Which of the following strategies can be used to defeat detection by a network-based IDS application?