What is the intrusion practice of encapsulating a message that would be rejected by the firewall inside a second message that will pass through the firewall?
a. Tunneling.
b. Identification spoofing.
c. Application-based attacks.
d. Second message encryption.
Answer: A