An attacker can create an _____attack by sending hundreds or thousands of email with very large attachments
a) Connection Attacks
b) Auto responder attacks
c) Attachment Overloading Attacks
d) All of the above
a) Connection Attacks
b) Auto responder attacks
c) Attachment Overloading Attacks
d) All of the above