PdfPrep.com

Which of the following BEST describes the attack?

An attacker has gained control of several systems on the Internet and is using them to attack a website, causing it to stop responding to legitimate traffic.

Which of the following BEST describes the attack?
A . MITM
B . DNS poisoning
C . Buffer overflow
D . DDoS

Answer: D

Exit mobile version