While evaluating network security threats, which of the following attacks utilizes numerous devices to flood a target with excessive traffic?
Malware
Spoofing
Distributed denial-of-service (DDoS) attacks
Phishing

Computer Networks Exercises are loading ...