What is the intrusion practice of encapsulating a message that would be rejected by the firewall inside a second message that will pass through the firewall?

What is the intrusion practice of encapsulating a message that would be rejected by the firewall inside a second message that will pass through the firewall?



a. Tunneling.
b. Identification spoofing.
c. Application-based attacks.
d. Second message encryption.





Answer: A