Welcome to Westonci.ca, the Q&A platform where your questions are met with detailed answers from experienced experts. Experience the convenience of getting accurate answers to your questions from a dedicated community of professionals. Connect with a community of professionals ready to help you find accurate solutions to your questions quickly and efficiently.

Which of the following security attacks occurs when an attacker sends the target system a flood of data or requests that consume the target system's resources?
A. Smurf
B. DoS
C. DDOS
D. FTP bounce