________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
a) A Trojan horse
b) A DDoS attack
c) Port blocking
d) A polymorphic virus