An attacker can create an________attack by sending hundreds or thousands of e-mails a with
very large attachments.
A. Connection Attack
B. Auto responder Attack
C. Attachment Overloading Attack
D. All the above
very large attachments.
A. Connection Attack
B. Auto responder Attack
C. Attachment Overloading Attack
D. All the above