Knowledge check

Completed

Check your knowledge

1.

What can an attacker achieve through prompt injection attacks?

2.

How can developers control which content is trusted in the Semantic Kernel SDK?

3.

Which of the following is a feature of the Function Invocation Filter in the Semantic Kernel SDK?