williamstafford8731 williamstafford8731 16-11-2021 Computers and Technology contestada A(n) ________ attack requires a victim host to prepare for many connections, using up resources until the computer can no longer serve legitimate users. (Choose the most specific choice)