An IoT manufacturer discovers that hackers have injected malware into their devices' firmware updates. Which of the following methods could the manufacturer use to mitigate this risk?
I feel like we had a practice question about restricting firmware updates to trusted admins. That could help, but I'm not sure if it's enough on its own.
Okay, I think I've got a handle on this. I'll start by identifying the true statements, and then double-check my reasoning to make sure I'm not missing anything.
Ah, I see. If you do the cleansing before partitioning, then the training and test sets will both be affected, making it harder to assess the model's true performance. Doing it after partitioning keeps the test set clean and unaffected.
Alright, I think I've got it. The answer that's not a common impact is C - conflicts when also applying the Decoupled Contract pattern. Feels like a solid choice.
Hmm, I'm not sure about this one. The question is asking about applying the technology, but the passage doesn't explicitly say we should use it everywhere. I might need to think this through a bit more.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Alverta
4 months agoAlton
4 months agoCraig
4 months agoSlyvia
5 months agoJoni
5 months agoRuby
5 months agoMonroe
5 months agoRickie
5 months agoElmira
5 months agoJames
5 months agoRaymon
5 months agoFletcher
5 months agoSilva
5 months ago