What best describes a DoS attack?
A. attempts to consume all of a critical computer or network resource in order to make it unavailable for valid use
B. poses as legitimate software or email attachment in order to launch a malicious attack when opened
C. can steal data such as user names and passwords without the user realizing that they have been compromised
D. rarely seen because DoS attacks are extremely difficult to engineer and almost impossible to deliver