Step 1: Defining Denial of Service (DoS).
A DoS attack is executed when attackers overwhelm a server, network, or service with an excessive volume of requests, thereby depleting its resources and rendering it inaccessible to legitimate users.
Step 2: Examining the Options.
- Option 1: Snooping → Pertains to unauthorized access of private information, not service overload.
- Option 2: Eavesdropping → Relates to covertly monitoring communications, not service denial.
- Option 3: Denial of Service → Correct → Involves overwhelming resources with illegitimate requests to block access.
- Option 4: Plagiarism → Unrelated, concerns the appropriation of content.
Step 3: Further Elaboration.
A more sophisticated variant is Distributed Denial of Service (DDoS), wherein numerous compromised systems concurrently target a single entity, significantly complicating defense efforts.
Conclusion: \[\boxed{\text{Denial of Service (DoS) attack}}\]