ISC Exam Questions

What attack is typically used for identifying the topology of the target network?

What attack is typically used for identifying the topology of the target network?

A.
Spoofing

B.
Brute force

C.
Teardrop

D.
Scanning

Explanation:
Flaw exploitation attacks exploit a flaw in the target system’s software in order to cause a processing
failure or to cause it to exhaust system resources. An example of such a processing failure is the
‘ping of death’ attack. This attack involved sending an unexpectedly large ping packet to certain
Windows systems. The target system could not handle this abnormal packet, and a system crash
resulted. With respect to resource exhaustion attacks, the resources targeted include CPU time,
memory, disk space, space in a special buffer, or network bandwidth. In many cases, simply patching
the software can circumvent this type of DOS attack.