What are examples of network attacks that bypass the firewall?
a. Identification spoofing and tunneling.
b. Tunneling and application-based attacks.
c. Second message encryption and identification spoofing.
d. Application-based attacks and second message encryption.
Answer: B