1. Net abuse consisting of sending huge volumes of email to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted.
1 point
Clear selection
2. An attack in which one person or program successfully masquerades as another by falsifying data, thereby gaining an illegitimate advantage.
1 point
Clear selection
3.Attempt to obtain sensitive information such as usernames, passwords, and credit card details, often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.
1 point
Clear selection
4. The attack involves having a client repeatedly send SYN (synchronization) packets to every port on a server, using fake IP addresses.