True/False (30 point) L We wil be totally secure when our systems 9. Data retention of sensitive data and s are propery patched, when we use strong passwords, and we are connected to the daposal after expiration are never part of an audit nternet with perimeter and antivins 10. Asymmetric algorithms are faster, however, symmetric algorithms provide easier key 2Non repudiation is specifying where the requesting party should be allowed or denied access A. True B. False 11. Passive Directory (PO) is a database, which A.True False 3. Tentfeatior is. the claim of what can be used to centrally manage users and computers in a Microsot Windows someone or something is A. TrueB. False A TrueB False Server-side othacks take advantage of weaknesses in applications that are running on the computer being operated directly by the user 12. Virtual Private Networks allow many iP addresses to use a machines with private single Public IP Address to connect to the ntenet A. TrueB Fahe All the users of a system should be able to change the audit logs. A True B. False 13. SSH is a protocol used to remotely S. administer a server and it encrypts the traffic between two ends of the A True &False Discovering vulnerabilities is critical so they can be patched before attackers compromise your system 6. A. True 8. False 14. Acceptability represents being able to find our chosen biometric characteristic in the majority of people we expect to enroll in A. True8. False Stream ciphers are better for use in situations where the size of the message is fixed or known in advance 7. the system A True 8. False 15. The Imitation Game was an encryption A. True B. False Hash functions that can be used to digitally sign a communication or a file is a way of providing nonrepudiation system used by Germans in World War and was broken by the Bombe developed by the Allied Forces 8. A. True 8. False A. True B. False