_____________ can be made functional to diverse aspects of software development & hardware improvement activities.
(a) Reverse hacking
(b) Cracking
(c) Reverse engineering
(d) Social engineering
I have been asked this question in a job interview.
My question is based upon Attack Vectors in section Understanding Attack Vectors of Cyber Security