Mal is engaging in an IP spoofing attack against a target organization over the internet. Which one of the following limitations does the attack have, if Mal has complete control of her own network?
a) Lack of stealth
b) Difficulty in data exfiltration
c) Inability to evade intrusion detection systems
d) Inability to hide the source IP address