Which three security measures could be applied in different ML workflow stages to defend them against malicious activities? (Select three.)
Which three security measures could be applied in different ML workflow stages to defend them against malicious activities? (Select three.)
A . Disable logging for model access.
B . Launch ML Instances In a virtual private cloud (VPC).
C . Monitor model degradation.
D . Use data encryption.
E . Use max privilege to control access to ML artifacts.
F . Use Secrets Manager to protect credentials.
Answer: BDF
Explanation:
Security measures can be applied in different ML workflow stages to defend them against malicious activities, such as data theft, model tampering, or adversarial attacks.
Some of the security measures are:
Launch ML Instances In a virtual private cloud (VPC): A VPC is a logically isolated section of a cloud provider’s network that allows users to launch and control their own resources. By launching ML instances in a VPC, users can enhance the security and privacy of their data and models, as well as restrict the access and traffic to and from the instances.
Use data encryption: Data encryption is the process of transforming data into an unreadable format using a secret key or algorithm. Data encryption can protect the confidentiality, integrity, and availability of data at rest (stored in databases or files) or in transit (transferred over networks). Data encryption can prevent unauthorized access, modification, or leakage of sensitive data.
Use Secrets Manager to protect credentials: Secrets Manager is a service that helps users securely store, manage, and retrieve secrets, such as passwords, API keys, tokens, or certificates. Secrets Manager can help users protect their credentials from unauthorized access or exposure, as well as rotate them automatically to comply with security policies.
Latest AIP-210 Dumps Valid Version with 90 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund