A common mobile device vulnerability has made unauthorized modifications to a device. The device owner removes the vendor/carrier provided limitations on the mobile device. This is also known as:
A. jailbreaking.
B. cracking.
C. hashing.
D. fuzzing.