Which two architectures should you consider?

Your agricultural division is experimenting with fully autonomous vehicles. You want your architecture to promote strong security during vehicle operation.

Which two architectures should you consider? (Choose two.)
A . Treat every micro service call between modules on the vehicle as untrusted.
B . Require IPv6 for connectivity to ensure a secure address space.
C . Use a trusted platform module (TPM) and verify firmware and binaries on boot.
D . Use a functional programming language to isolate code execution cycles.
E . Use multiple connectivity subsystems for redundancy.
F . Enclose the vehicle’s drive electronics in a Faraday cage to isolate chips.

Answer: AC

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments