Which combination of actions should the company take to prevent this threat?
A company allows users to download its mobile app onto their phones.The app is MQTT based and connects to AWS IoT Core to subscribe to specific client-related topics.Recently, the company discovered that some malicious attackers have been trying to get a Trojan horse onto legitimate mobile phones.The Trojan horse poses as the authentic application and uses a client ID with injected special characters to gain access to topics outside the client’s privilege scope.Which combination of actions should the company take to prevent this threat? (Choose two.)Read More →