The attacker will use different bots (zombie PCs) to ping your system and the name of the attack is _________________
(a) Distributed Denial-of-Service (DDoS)
(b) Permanent Denial-of-Service (PDoS)
(c) Denial-of-Service (DoS)
(d) Controlled Denial-of-Service (CDoS)
The question was asked by my school principal while I was bunking the class.
My enquiry is from How Security Breach Takes Place topic in chapter Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security