Which of the following is a NOT an advantage of traditional telephony?

A. Separation from the data network lessens the possibility of snooping or eavesdropping.
B. Theft of service is only possible if physical access to an unattended set is possible .
C. Denial of Service attacks are limited to cutting wires or destroying phones.
D. Performance issues when mixing VoIP with regular data


D
Explanation: In traditional telephony, phone data and regular data are on separate networks.

Computer Science & Information Technology

You might also like to view...

What is the value of y after the following statement is coded and executed, given that x = 3? Set y = pow(x, x)

a. 3 b. 9 c. 27 d. 81

Computer Science & Information Technology

Which of the following is an example of a secondary storage device?

A) a hard disk drive B) a USB flash drive C) a CD D) a DVD E) all of the above

Computer Science & Information Technology

Match the following terms to their meanings:

I. "Opens with" II. ghost image III. safe mode IV. restore point V. firmware A. a compressed file containing a copy of the installed software B. programs stored within the device that controls a piece of hardware C. option to change the desired program to open a file D. the fewest programs are loaded upon startup to help identify a problem E. representation of your computer's system files at a particular point in time

Computer Science & Information Technology

It is a best practice idea to rename the ____ account on a bastion host after initial configuration.

A. Administrator B. Guest C. Default D. System

Computer Science & Information Technology