From the list below, choose the exploit that can be considered a DoS attack because more traffic than what the node can handle is flooded to that node.
Which of the following is the MOST efficient way to force a large number of users to change their passwords on logon?
Choose the option that correctly details the greatest vulnerability of using Instant Messaging clients.