Answer:
The answer is "Option D".
Explanation:
It refers to an attacker gains remote access to protected networks and information from an organization. This protocol is an earlier than usual-stage breach, which can be a result of these issues as device damage and data loss, and wrong choices can be described as follows: