Problem
1. Discuss the best way to ensure the protection of sensitive data.
2. What are at least two ways to verify integrity of packages are clean and not tampered by trojans viruses?
3. What are the best practices of the protection of network connectivity?
4. What are best practices for securing root passwords?
Be detailed, explain in a paragraph for each question, and reference sources.