An attack which attempts to make targeted systems unavailable to its intended users is called:
Denial-of-Service attack
Slow read attack
Spoofed attack
Starvation attack
Which of the following is not an attack, but a tool which searches for available services to identify vulnerabilities in order to attack a given target?