AAttempts to “flood” a network, thereby preventing legitimate network traffic
BAttempts to disrupt connections between two machines, thereby preventing access to a service
CAttempts to prevent a particular individual from accessing a service
DAll of these