Most computer attacks are designed to steal information or money. Which of the following attacks is designed to slow down or sto
p a Web site, often to prevent legitimate users from accessing the Web site?A) Man-in-the-middle attack. B) Cross-site scripting attack.
C) Dictionary attack.
D) DoS attack.
E) Spoofing attack.
Denial of Service attack occurs when an hacker prevents the real users from accessing the service by sending excessive message to the server asking it to authenticate requests with invalid return address.