gtyler9931 gtyler9931 Today at 7:57 AM Computers and Technology Answered A particular attack is named this way because these attacks exploit system vulnerabilities? ________. Denial of Service (DoS) attack 2) Man-in-the-middle (MitM) attack 3) Buffer overflow attack 4) Zero-day exploit attack