A company is evaluating the security of a foundation model (FM). In the test, they attempt to bypass the model's safety guardrails to generate harmful content. Which security technique does this scenario describe? | AWS Certified AI Practitioner Quiz - LeetQuiz