_____ is the process of bypassing the built-in limitations and protections of a mobile device. Group of answer choices D. Slicing B. Twisting C. Jailbreaking A. Cracking