
Answer-first summary for fast verification
Answer: Treat every micro service call between modules on the vehicle as untrusted., Use a trusted platform module (TPM) and verify firmware and binaries on boot.
Option A is correct because treating every microservice call between modules on the vehicle as untrusted aligns with the Zero Trust security model, which is a best practice in modern security architectures. Option C is also correct as using a trusted platform module (TPM) and verifying firmware and binaries on boot ensures that the vehicle's software has not been tampered with, providing a secure foundation for its operation. Other options, such as IPv6 for connectivity (Option B), using a functional programming language (Option D), and using multiple connectivity subsystems for redundancy (Option E), do not directly address security during vehicle operation.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
TerramEarth's agricultural division is experimenting with fully autonomous vehicles that collect data and can be upgraded with new computing modules in the field. You want your architecture to promote strong security during vehicle operation. Considering the need for robust security measures in a dynamic environment, which two architectures should you consider? (Choose two.)
A
Treat every micro service call between modules on the vehicle as untrusted.
B
Require IPv6 for connectivity to ensure a secure address space.
C
Use a trusted platform module (TPM) and verify firmware and binaries on boot.
D
Use a functional programming language to isolate code execution cycles.
E
Use multiple connectivity subsystems for redundancy.
No comments yet.