Which of the following is not an appropriate way of targeting a mobile phone for hacking?
(a) Target mobile hardware vulnerabilities
(b) Target apps’ vulnerabilities
(c) Setup Keyloggers and spyware in smart-phones
(d) Snatch the phone
I have been asked this question in a national level competition.
My question is based upon Cyber Security Types in portion Cyber Security Types of Cyber Security