Which of the following scenarios best describes an attack that is likely to cause abnormal consumption of system resources, potentially leading to a system outage?
Email spam campaign distributing unsolicited messages
Phishing attack that deceives a user into sharing their password
DDoS attack
Social engineering attack that tricks an employee into wiring money