d1:
What, in your opinion, is the difference between a decentralized architecture and a centralized architecture?
What is an example of a business decision that would be affected by the choice of the architecture?
d2:
Create an outline for a training session to help your team avoid phishing.
What would you include in that training session?
What are some typical signs that an email might be fraudulent?