A program that defends against a port scanner will attempt to:
which one could be used as a tool to discover a network topology?