Watch this video on YouTube
Which of the following attacks primarily seeks to flood a network or system, rendering it inaccessible to its intended users?