A network administrator finds that an unauthorized user has gained access to the organization's network. However, the security devices on the network show no signs of abnormal traffic from the outside. The unauthorized user likely carried out a _____ or other attack.

a) DoS
b) DDoS
c) Phishing
d) Insider threat