During a penetration test, you aim to demonstrate the impact of compromised data integrity on a network file system that contains critical operational data. Which attack method would BEST demonstrate the potential for data corruption in the network file system?
Exploiting weak service configuration
Implementing an ARP poisoning attack
Introducing malformed or non-standard data structures
Overloading the system with excessive traffic