Suppose you browse to a website that presents a typical X.50…

Suppose you browse to a website that presents a typical X.509 certificate chain, containing three (3) certificates.  The certificate at the bottom of the chain is for the website.  You browser shows that the certificate is verified.  Which of the following is/are true about the certificate at the top of the chain?  

A hacker in Albania posts a provocative political message to…

A hacker in Albania posts a provocative political message to a social media site, with an online poll asking if the readers agrees or disagrees.  If any user clicks on either of the poll answers, one of many servers operated by the hacker continually sends packets of random data to the user’s IP address for 24 hours, overwhelming the user’s network connection and making it impossible to effectively connect to any online application.  Sending a massive amount of data like this is best described as a/an attack.  Give the complete name, not an abbreviation.