A user is sending a large number of protocol packets to a network in order to saturate its
resources and to disrupt connections to prevent communications between services. Which type of
attack is this?
A.
Denial-of-Service attack
B.
Vulnerability attack
C.
Social Engineering attack
D.
Impersonation attack