A malicious attacker has compromised a database by implementing a Python-based script that
will automatically establish an SSH connection daily between the hours of 2:00am and 5:00am.
Which of the following is the MOST common motive for the attack vector that was used?
B. Persistence/maintaining access
D. Lateral movement