please answer the following : 1. It is very common for web sites to encrypt the initial logon and then switch to non encrypted traffic. True or False 2. It is not critical that functional and non-functional requirements be treated as equally important. True or False 3. "In a large and complex network, time stamping may vary and that is common and not a concern?" True or False 4. "Cryptographic Keys should be stored on the same system as the data, to prevent ease dropping over the network?" True or False 5."Application developers should consider developing their own security services, even if they exists in the environment, to add an additional layer of protection?" True or False
please answer the following :
1. It is very common for web sites to encrypt the initial logon and then switch to non encrypted traffic.
True or False
2. It is not critical that functional and non-functional requirements be treated as equally important.
True or False
3. "In a large and complex network, time stamping may vary and that is common and not a concern?"
True or False
4. "Cryptographic Keys should be stored on the same system as the data, to prevent ease dropping over the network?"
True or False
5."Application developers should consider developing their own security services, even if they exists in the environment, to add an additional layer of protection?"
True or False
Trending now
This is a popular solution!
Step by step
Solved in 5 steps