Which of the following describes the exploitation stage of the mobile device penetration testing process?

A. The use of scanning tools to determine which wireless networks the mobile device is looking for.
B. The inspection of data areas on the mobile device for sensitive information.
C. The use of scanning tools to locate mobile devices attached to your network.
D. The use of man - in - the - middle attacks, spoofing, and other attacks to take advantage of client - side vulnerabilities.