What describes a repudiation attack?

A.
An attempt to compromise accountability goals of the security
B.
Stealing a private key to decrypt the data-in-transit
C.
Unauthorized access to information to compromise confidentiality
D.
A series of repetitive attacks to the physical information infrastructure