What is a type of an active attack on an IT infrastructure?

A.
Attempt to modify information for malicious purposes
B.
Attempt to leak the data from the storage system
C.
Attempt to gain unauthorized access into the system
D.
Attempt to gain access to data in transit