All of the following are correct except:
|
a. An IoT device could be hijacked and then send spam
e-mails |
|
|
|
b. An IoT device could be hijacked and then deployed into
botnets and used for DDoS attacks |
|
|
|
c. IoT devices are vulnerable to the threat posed by the Shodan
search engine |
|
|
|