PrepAway - Latest Free Exam Questions & Answers

What attack is typically used for identifying the topology of the target network?

What attack is typically used for identifying the topology of the target network?

PrepAway - Latest Free Exam Questions & Answers

A.
Spoofing

B.
Brute force

C.
Teardrop

D.
Scanning

Explanation:
Flaw exploitation attacks exploit a flaw in the target system’s software in order to
cause a processing failure or to cause it to exhaust system resources. An example of
such a processing failure is the ‘ping of death’ attack. This attack involved sending
an unexpectedly large ping packet to certain Windows systems. The target system could
not handle this abnormal packet, and a system crash resulted. With respect to resource
exhaustion attacks, the resources targeted include CPU time, memory, disk space, space
in a special buffer, or network bandwidth. In many cases, simply patching the software
can circumvent this type of DOS attack.


Leave a Reply