Which of the following strategies can the employee use to evade detection by a network-based IDS application?
An employee wants to bypass detection by a network-based IDS application and does not want to attack the system containing the IDS application. Which of the following strategies can the employee use to evade detection by a network-based IDS application?