Which of the following activity is a good aspect of reverse engineering in ethical hacking?
(a) Cracking the trial version of the product to make it full-version
(b) Removing the product key insertion step
(c) Jumping the code for premium facilities
(d) Determining the vulnerabilities in the product.
I had been asked this question in quiz.
This key question is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security