An attacker has gained access to the company’s web server by using the administrator’s credentials. The attacker then begins to work on compromising the
sensitive data on other servers. Which off the following BEST describes this type of attack?

A.
Privilege escalation
B.
Client-side attack
C.
Man-in-the-middle
D.
Transitive access