Which attack requires an attacker to use advanced knowledge of the Transmission Control Protocol/Internet Protocol (TCP/IP) suite to break up packets into pieces that can bypass most intrusion detection systems (IDSs)?

Select one:
a. Ping flooding
b. Internet Protocol (IP) fragmentation/fragmentation attack
c. Smurf
d. SYN flooding