You are troubleshooting a server outage for Crucial Technologies. During the troubleshooting process you discover that the server is being flooded with traffic from multiple different sources outside the network. What kind of attack is happening?
Dictionary attack
Zero-day
Spoofing
DOS
DDOS