Which of the following activity is a good aspect of reverse engineering in ethical hacking?
(a) Cracking the trial version of the product to make it full-version
(b) Removing the product key insertion step
(c) Jumping the code for premium facilities
(d) Determine whether the app contains any undocumented functionality
I got this question in an international level competition.
Question is taken from Attack Vectors in division Understanding Attack Vectors of Cyber Security