RE is often defined as the crafting technique of ____________ who uses his skills to remove copy protection or trial versions from software or media.
(a) crackers
(b) risk assessment team
(c) auditors
(d) surveillance monitoring team
I have been asked this question during an interview for a job.
This interesting question is from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security