An attacker has gained control of several systems on the Internet and is using them to attack a website, causing it to stop responding to legitimate traffic.
Which of the following BEST describes the attack?
A . MITM
B . DNS poisoning
C . Buffer overflow
D . DDoS
Answer: D