Which three best describe denial-of-service attacks? (Choose three.)
A.
transmission of ping packets of a certain size to crash a remote host
B.
the unauthorized discovery and mapping of systems, services, or vulnerabilities
C.
transmission of TCP SYN requests from a spoofed IP address to exhaust the resources of a victim
D.
disabling or corrupting networks, systems, or services with the intent to deny the service to
intended users