From our authors textbook, in Chapter 6:   In a ____________…

From our authors textbook, in Chapter 6:   In a _________________________________________ attack an adversary can secretly intercept messages between two or more parties who believe they are communicating with each other. Attackers can then use their position as the “ ” to observe this confidential information, even maliciously edit it, or insert their own messages. This can lead to a devastating data breach or the spread of malware throughout an organization’s IT environment or ML training system.   What term goes in the blank?        means I removed the term.      

  From our authors textbook, in Chapter 6:   A ‘classic’ arc…

  From our authors textbook, in Chapter 6:   A ‘classic’ architecture:    ______________________________ computing is defined as a system consisting of software components spread over different computers but running as a single entity. A __________________ system can be an arrangement of different configurations, such as mainframes, computers, workstations, endpoint devices and minicomputers.  Organizations have turned to these systems to handle the data generation explosion and increased application performance needs.   This is especially true because the process of adding hardware to a _________________________ system is simpler than upgrading and replacing an entire centralized system made up of powerful servers.   Same answer for all the blanks.