In which of the following IDS evasion techniques does an attacker deliver data in multiple small sized packets, which makes it very difficult for an IDS to detect the attack signatures of such attacks?
Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?