An attacker has gained access to the company’s web server by using the administrator’s
credentials. The attacker then begins to work on compromising the sensitive data on other
servers. Which off the following BEST describes this type of attack?
A.
Privilege escalation
B.
Client-side attack
C.
Man-in-the-middle
D.
Transitive access