Which of the following BEST describes this type of attack?
When examining HTTP server logs the security administrator notices that the company’s online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?