An attacker has performed a privilege escalation attack on your system. Which of the following is MOST likely the goal behind this attack?

O To delete access to event logs.
O To lay a foundation for later.
O To limit user privileges.
O To check for system vulnerabilities.