Which of the following attacks could be detected through SIP and SRTP traffic analysis?

A. smurf
B. SPIT
C. SYN flood
D. teardrop


B
Explanation: VoIP Spam or Spam over IP Telephony (SPIT) is characterized by bulk unsolicited calls using the Voice over Internet Protocol, SIP and SRTP traffic analysis. The underlying technology driving this threat is Session Initiation Protocol. Secure Real-time Transport Protocol (or SRTP) is a secure version of Real Time Protocol (RTP) which is also used in VoIP traffic. Through SIP and SRTP traffic analysis these attacks can be detected.

Computer Science & Information Technology

You might also like to view...

The statement "{P}S{Q}, {Q}T{R} => {P}S;T{R}" is an example of the rule of ______.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Hard drives use ________ media to store data

Fill in the blank(s) with correct word

Computer Science & Information Technology

To modify a chart's graphic effects, colors, and background, apply a chart ________

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When a tree is represented in parenthetical notation, each open parenthesis indicates the start of a new _____.

A. subtree B. group C. level D. path

Computer Science & Information Technology