After an attacker has successfully gained remote access to a server with minimal privileges, which of the following is their next step?A. Elevate system privilegesB. Monitor network trafficC. Capture private keysD. Begin key recovery