Helga is a systems administrator. She sees that an attacker from a remote location is sending
invalid packets, trying to monopolize Helga’s network connection so that a denial of service
occurs. What characteristic of the activity makes Helga think this is a denial-of-service attack?
A.
Use of an illicit server
B.
Bandwidth consumption
C.
System slowdown
D.
Hijacking of internal user resources