Your agricultural division is experimenting with fully autonomous vehicles.
You want your architecture to promote strong security during vehicle operation.
Which two architecture should you consider?
Choose 2 answers:
Treat every micro service call between modules on the vehicle as untrusted.
Require IPv6 for connectivity to ensure a secure address space.
Use a trusted platform module (TPM) and verify firmware and binaries on boot.
Use a functional programming language to isolate code execution cycles.
Use multiple connectivity subsystems for redundancy.
Enclose the vehicle's drive electronics in a Faraday cage to isolate chips.
Submit