You need to determine how attackers can evade an intrusion detection system ( IDS). Which of the following best describes session splicing?

A ) Spoofing the attack source
B ) Encoding the attack payload
C ) Disabling the attack target
D ) Fragmenting the attack payload