A security administrator has received multiple calls from the help desk about customers who are unable to access the organization’s web server. Upon reviewing the log files the security administrator determines multiple open requests have been made from multiple IP addresses, which is consuming system resources.
Which of the following attack types does this BEST describe?
A . DDoS
B . DoS
C . Zero day
D . Logic bomb
Answer: A