What secure protocol is recommended for voice and video?

A. SRTP
B. S/MIME
C. IMAP
D. IPsec


Answer: A

Computer Science & Information Technology

You might also like to view...

Describe the SQL Server Import and Export Wizard.  What are its advantages and limitations?

What will be an ideal response?

Computer Science & Information Technology

Which of the following buttons is used to insert manual page breaks?

A.
B.
C.
D.

Computer Science & Information Technology

When you do not know when you write the program whether the loop will be executed two times, 200 times, or not at all you should use a definite loop.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Molly, a technician, has been asked with researching an emulator for the software developers to test cross-platform applications on various PCs and a variety of mobile devices. what will be a required step in selecting an emulator?(select 2)

A. Verify the system requirements of the hypervisor
B. Verify the hypervisor software supports the emulator needed for testing
C. verify the emulator supports virtual RAM
D. verify the emulator supports virtual processor
E. verify the emulator supports NAT and bridged network connections

Computer Science & Information Technology