Consider the following actions:
1. Exhausting resources such as CPU cycles or network bandwidth
2. Exploiting weaknesses in communication protocols
3. Hijacking of user identities
4. Intercepting communications traffic
Which of these actions are involved in a Denial of Service (DoS) attack?
A.
2 and 3
B.
2 and 4
C.
1 and 3
D.
1 and 2