Which danger do firmware attacks pose?
These attacks target only white box servers because the supply chain for these servers is not protected.
These attacks are designed to return the server to factory default settings before they are detected.
Security programs fail to detect these attacks because they run under the server OS.
Vendors do not have a way to detect and remediate these attacks so the only defense is securing the supply chain.
What correctly describes trends in how customers want to consume or buy IT solutions?
The majority of customers want to consume converged infrastructure oﬀ-prem with an as-a-service model.
The majority of customers want to buy converged infrastructure with an upfront capital expenditure.
The majority of customers want a ﬂexible payment model of some kind, either as-a-service or leasing.
The majority of customers want to make an upfront payment to use oﬀ-prem resources in a public cloud.
What should HPE partners do to comply with the UN Guiding Principles on Business and Human Rights?
Create a plan for improving human rights in the geographic regions in which they operate.
Donate a portion of proceeds towards commissions for addressing human rights violations.
Implement a process for identifying sales transactions with a high risk for human rights violations.
Establish a committee for researching human rights issues and principles.
TESTED 16 May 2022