Que: Which of the following is not an appropriate way of targeting a mobile phone for hacking?

a. Target mobile hardware vulnerabilities
b. Target apps’ vulnerabilities
c. Setup Keyloggers and spyware in smart-phones
d. Snatch the phone
Answer: Snatch the phone

Leave a Comment