When examining HTTP server logs the security administrator notices that the company’s online
store crashes after a particular search string is executed by a single external user. Which of the
following BEST describes this type of attack?
A.
Spim
B.
DDoS
C.
Spoofing
D.
DoS
Explanation: