A ______________ tries to formulate a web resource occupied or busy its users by flooding the URL of the victim with unlimited requests than the server can handle.
(a) Phishing attack
(b) DoS attack
(c) Website attack
(d) MiTM attack
I got this question in an internship interview.
Question is taken from Attack Vectors in portion Understanding Attack Vectors of Cyber Security