1. An SA has no access to sensitive information by default. True False 2. Dynamic network configuration allows central management of network infrastructure. True False 3. Virtual networks can provide security between virtual servers. True False 4. When debugging, you should find the state of the service/system. True False 5. A service monitor should be able to determine if the service is responding correctly. True False 6. A name space can be used to storage usernames. True False 7. A demilitarized zone should have total access to the Internet. True False 8. Changes should be managed by a process, so changes need a minimum amount of approval, to protect operations. True False 9. An open architecture means that a service is not proprietary. True False 10 Prior to release, antivirus software should be centrally managed and updates should be quickly reviewed. True False 11 When a computer is ready to be deployed, it should be done and ready to work. True False 12 Even though it may be difficult, shared passwords must be changed immediately when terminating an SA. True False 13 Email is made up of several open standards. True False 14 A change request should include nontechnical and technical details. True False 15 When gathering requirements, it is important to know what will be used to perform an action not only the protocol or how. True False .