d1: What, in your opinion, is the difference between a decentralized architecture and a centralized architecture? What is an example of a business decision that would be affected by the choice of the architecture? d2: Create an outline for a training session to help your team avoid phishing. What would you include in that training session? What are some typical signs that an email might be fraudulent?