Which of the following scenarios best describes an attack that is likely to cause abnormal consumption of system resources, potentially leading to a system outage?
Social engineering attack that tricks an employee into wiring money
DDoS attack
Phishing attack that deceives a user into sharing their password
Email spam campaign distributing unsolicited messages