What is the primary purpose of Denial-of-Service Attacks in the context of CEH - Certified Ethical Hacker?