Which of the following attacks could be detected through SIP and SRTP traffic analysis?
A. smurf
B. SPIT
C. SYN flood
D. teardrop
B
Explanation: VoIP Spam or Spam over IP Telephony (SPIT) is characterized by bulk unsolicited calls using the Voice over Internet Protocol, SIP and SRTP traffic analysis. The underlying technology driving this threat is Session Initiation Protocol. Secure Real-time Transport Protocol (or SRTP) is a secure version of Real Time Protocol (RTP) which is also used in VoIP traffic. Through SIP and SRTP traffic analysis these attacks can be detected.
You might also like to view...
The statement "{P}S{Q}, {Q}T{R} => {P}S;T{R}" is an example of the rule of ______.
Fill in the blank(s) with the appropriate word(s).
Hard drives use ________ media to store data
Fill in the blank(s) with correct word
To modify a chart's graphic effects, colors, and background, apply a chart ________
Fill in the blank(s) with the appropriate word(s).
When a tree is represented in parenthetical notation, each open parenthesis indicates the start of a new _____.
A. subtree B. group C. level D. path