Analyze the use of digital signatures to validate device drivers. Describe a situation where it is necessary to bypass this protection. Justify your response.
Suggest the key guidelines that one should meet in order to justify an administrator's decision to bypass the use of digital signatures when validating device drivers. Provide a rationale for your response.