The security requirements are: confidentiality, integrity, availability, authenticity, and __________. a. disruption b. accountability c. Vulnerability d. security policy HTTP's TCP session stays open while waiting for multiple requests and their responses. Select one: True False Spoofing and spamming are two of the vulnerabilities associated with which of the following protocols? Select one: a. SMTP b. TFTP c. FTP d. HTTP.