Which of the following describes Unauthorized Data Manipulation?
AA user denying a transaction.
BAn attacker impersonating a legitimate user.
CUnlawfully modifying or altering confidential information after a system compromise.
DFlooding a server with requests causing it to crash.
