Applications of Foundation Models I
Equip yourself with the necessary understanding to confidently tackle exam questions by reviewing assessment questions and explanations against all options.
We'll cover the following...
Question 31
Question 32
What is the potential risk of prompt engineering, where attackers exploit vulnerabilities to insert harmful input that causes the model to generate harmful or biased outputs?
A. Hijacking
B. Prompt injection ...