Answer:
"Option A and Option B" is the correct answer.
Explanation:
It is a form of attack, that is usually used by breaching huge amounts of transport, that open up the network instead of a service. It is a large- server through the valid source, that tries to steal server resources of a group of cyborgs by establishing and disconnecting the link. That's why options A and B are correct.
In option C, It doesn't initiate a single call, if the intruder must first create and delete TCP connections as the servers become underfunded for authorized source links.