Which of the following BEST describes the attack?

Posted by: Pdfprep Category: SY0-501 Tags: , ,

An attacker has gained control of several systems on the Internet and is using them to attack a website, causing it to stop responding to legitimate traffic.

Which of the following BEST describes the attack?
A . MITM
B . DNS poisoning
C . Buffer overflow
D . DDoS

Answer: D

Leave a Reply

Your email address will not be published.