Which of the following types of attacks is only intended to make a computer resource unavailable to its users?
Denial of Service attack
Replay attack
Teardrop attack
Land attack
Submit