Correct choice is (c) Maintaining Access
For explanation: After gaining access to a system, the hacker needs to keep a path open so that he/she in future can access the system. Therefore, backdoors are set which will later allow the attacker to gain access through it easily.