An organization finds a malicious USB in one of the servers in its server room. Which of the following best describes this attack?
a. An unknown attacker dropped hardware
b. An employee is capturing test data
c. The USB is being used for licensing a special software application
d. Rain Rainbow table are being generated