Which of the following attacks saturates network resources and disrupts services to a specific computer?
Replay attack
Teardrop attack
Denial-of-Service (DoS) attack
Polymorphic shell code attack
Submit