
Ultimate access to all questions.
A company is evaluating the security of a foundation model (FM). In the test, they attempt to bypass the model's safety guardrails to generate harmful content.
Which security technique does this scenario describe?
A
Fuzzing training data to find vulnerabilities
B
Denial of service (DoS)
C
Penetration testing with authorization
D
Jailbreak