1.What are some risks, threats, and vulnerabilities commonly found in the Workstation Domain that must be mitigated through a layered security strategy? 2. File-sharing utilities and client-to-client communication applications can provide the capability to share files with other users (for instance, peer-to-peer networking or sharing). What risks and/or vulnerabilities are […]