Remote exploitation of an unaltered vehicle by hackers is enabled by which of the following design decisions:
1 point
A. Being careless about the so-called "on-board bus architecture"
B. Not enforcing separation between on-board entertainment and safety systems
C. Using older, unsafe programming languages