1.Describe two of the architectures from below. What do they support? Do they have any shortcomings?
1) Monolithic
2) 2-Tier
3) 3-Tier
4) N-Tier
5) Distributed
6) Peer-to-Peer
2.What are some risks associated with employing a COTS security solution.
3. Name a couple of the pros and cons relating to the use of FOSS products?