Page 1499 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1499
them. The two most common examples are cross-site scripting (XSS)
and SQL injection attacks.
Know the network reconnaissance techniques used by
attackers preparing to attack a network. Before launching an
attack, attackers use IP sweeps to search out active hosts on a network.
These hosts are then subjected to port scans and other vulnerability
probes to locate weak spots that might be attacked in an attempt to
compromise the network. You should understand these attacks to help
protect your network against them, limiting the amount of
information attackers may glean.

