Hackers flooding a network server with many thousands of false communication requests is called ________?
1) spoofing
2) an SQL injection attack
3) a drive-by download
4) pharming
5) a denial-of-service attack