What is an example of an active attack on an IT infrastructure?

A.
Attempt to modify information for malicious purposes
B.
Attempt to copy the data from the storage system
C.
Attempt to gain unauthorized access into the system
D.
Attempt to gain access to the data in transit
Explanation: