Which of the following best describes a Distributed Denial of Service (DDoS) attack?