Alice, a contractor that was hired to develop a critical application, performs most of the programming remotely. In order to prevent establishing any form of direct remote access to the development platform, Alice placed a hardened server, which only she is authorized to connect to remotely, on the same network segment as the development system without anyone else's knowledge. Once the project was complete, Alice left word that the remote-access server should be dismantled to prevent potential malicious indirect access to the development platform and, ultimately, to the application server. Unfortunately, the server was never removed. What is this an example of?
A. Shadow IT
B. A direct-access vector
C. An indicator of compromise
D. Adversary TTP