ethical-hacker video for during a security audit, how should an analyst validate that the training data has not been compromised by malicious injections?
During a security audit, how should an analyst validate that the training data has not been compromised by malicious injections?