Whereas phishing attacks are ________, denial of service attacks are ________.
remote attacks requiring user action; remote attacks requiring no user action
remote attacks requiring no user action; attacks by a programmer developing a system
remote attacks requiring no user action; remote attacks requiring user action
distributed remote attacks requiring user action; attacks by a programmer developing a system