A security analyst identifies an atypical spike in total outbound DNS traffic volume from a network-attached security camera. Which of the following is most likely being observed?
A. Data exfiltration
B. Distributed denial-of-service
C. Denial-of-service attack
D. Input validation