Denial-of-service (DoS) attacks aim to disrupt the availability of systems, networks, or services by overwhelming resources or exploiting protocol weaknesses.
UDP flooding is a classic DoS attack where large volumes of UDP packets are sent to a target system, exhausting bandwidth and processing resources. Because UDP is connectionless, it is commonly abused for high-volume flooding attacks.
The ping of death is another well-known DoS attack that sends malformed or oversized ICMP packets to a target system. Older or unpatched systems may crash or become unresponsive when attempting to process these invalid packets.
Option B, Code Red, is a worm that exploited vulnerabilities in Microsoft IIS and could cause secondary DoS effects, but it is classified primarily as malware rather than a DoS attack type. Option C, man-in-the-middle, targets confidentiality and integrity, not availability. Option E refers to normal TCP behavior and is not an attack by itself.
Thus, the two denial-of-service attacks are UDP flooding and ping of death.