Instead of implementing single computer & its internet bandwidth, a ____________ utilizes various systems & their connections for flooding the targeted website.
(a) GoS attack
(b) PoS attack
(c) DDoS attack
(d) DoS attack
I got this question in class test.
This key question is from Attack Vectors in section Understanding Attack Vectors of Cyber Security