Which of the following is typically associated with a denial of service (dos) attack?
a. Overwhelming a target system with a high volume of traffic
b. Exploiting vulnerabilities to gain unauthorized access
c. Manipulating data to disrupt normal operations
d. Flooding a network with fake requests

Q&A Education