James is a black hat hacker employed as an authorized officer at Apple. He has credentials and signed a non-disclosure agreement to perform advanced penetration testing on the iOS 6.1.6 operating system, and has already gained low-level access to the mobile device using a backdoor. The process by which John could design/create his own custom firmware to exploit underlying vulnerabilities and gain a higher level of access to a UNIX shell with root privileges, essentially allowing them to do anything on the device is ? MMS b. Jailbreaking c. RCS d. Mobile content management Analysis: a. Incorrect. MMS is Multimedia Messaging Service. b. Incorrect. RCS is Rich Communication Service used for live chat. c. Correct. Jailbreaking is circumventing the built-in installation limitations and to gain access to UNIX shell with root privilliages. d. Incorrect. Mobile Content Management is used for subsequent editing and management of content. .