Possible security steps to protect and secure a VoIP network include which of the following:
a. Encrypting the VoIP data traffic
b. Using firewalls to prevent attacks
c. Routing VoIP data traffic on the same LANs as normal data traffic
d. All the above
a. Encrypting the VoIP data traffic and b. Using firewalls to prevent attacks
Explanation: Possible security steps to protect and secure a VoIP network include encrypting the VoIP data traffic, using firewalls to prevent attacks, and routing VoIP data traffic on separate LANs than normal data traffic.
You might also like to view...
Compare the update semantics of UNIX when accessing local files with those of NFS and AFS. Under what circumstances might clients become aware of the differences?
What will be an ideal response?
Speed for printers is measured in ________
A) pps B) Kps C) Mhz D) ppm
Garner, a management student, conducts a survey on the purchasing power of people in a small town and records the information on an Excel sheet. When he tries to print the data, print preview displays the last two rows on a separate sheet. To print the entire content on a single sheet, Garner should:?
A. ?change the settings to Wide Margins. B. ?zoom in on the active sheet. C. ?use automatic page break. D. ?scale the printout by reducing the font size.
An abstract class can contain ____.
A. only abstract methods B. only non-abstract methods C. abstract and non-abstract methods D. nothing