Which of the following can be described as a DoS attack?

A.
Disabling a specific system and making it unavailable to users
B.
Implementing a keylogger
C.
Intercepting a packet and decrypting the contents
D.
Communicating with employees to get company information