_______ is typically accomplished by flooding the targeted network or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled.
a) Phishing
b) DOS attack
c) Adware
d) Ransomware