Q: 3
Technical assessments of a high-stakes deployment using fine-tuned Large Language
Models (LLMs) reveal significant risks associated with the inheritance of weights from third-
party sources. The security architecture team is evaluating how Transfer Learning shifts the
attack surface compared to training models from scratch.
Which of the following are distinct characteristics or risks associated specifically with
Transfer Learning attacks? (Choose TWO.)
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.