What attack is typically used for identifying the topology of the target network?

A.
Spoofing
B.
Brute force
C.
Teardrop
D.
Scanning
Explanation:
Flaw exploitation attacks exploit a flaw in the target system’s software in order to
cause a processing failure or to cause it to exhaust system resources. An example of
such a processing failure is the ‘ping of death’ attack. This attack involved sending
an unexpectedly large ping packet to certain Windows systems. The target system could
not handle this abnormal packet, and a system crash resulted. With respect to resource
exhaustion attacks, the resources targeted include CPU time, memory, disk space, space
in a special buffer, or network bandwidth. In many cases, simply patching the software
can circumvent this type of DOS attack.