Answer:the correct answer is the c)
An insider
Step-by-step explanation:
Insiders that perform attacks have a distinct advantage over external attackers because they have authorized system access and also may be familiar with network architecture and system policies/procedures.