An organization is facing an attack where multiple compromised systems are being used to flood their web servers with traffic, preventing legitimate users from accessing online services. Which of the following would BEST describe this type of attack?
Traffic shaping configured incorrectly, leading to unintentional disruption of service.
A SYN flood attack targeting the TCP handshake process to consume server resources.
A distributed denial-of-service attack where multiple systems are targeting the servers.
A denial-of-service attack emanating from a single IP address to block service availability.