Choose the most difficult stage of an endpoint attack.
A. acquiring access to an endpoint inside the network
B. propagating a botnet once you have access to the systems
C. acquiring a list of ports open on a targeted computer
D. delivering a phishing email to employees