A network administrator observes an unusual surge in inbound traffic directed at the company's domain resolution infrastructure, with the traffic volume threatening to overwhelm system resources. Which type of attack is MOST likely being attempted?
DNS amplification attack
Wireless jamming attack
SYN flood attack
ARP spoofing attack