An attacker can create an …………………………….. attack by sending hundreds or thousands of emails with very large attachment
A)Attachment Overloading Attack B)Connection Attack C)Auto Responder Attack D)All of the Above
A)Attachment Overloading Attack B)Connection Attack C)Auto Responder Attack D)All of the Above