Which of the following is a threat to a VoIP network?
a. Call flooding.
b. Information is accessed by unauthorized persons.
c. Attacker becoming a trusted member of the network.
d. All the above are threats.
d. All the above are threats.
Explanation: The most common categories of threats include the following;
• Availability: Phone systems are intended to be in operation 24x7 . This means that any threat to availability is a concern. Threats of this type can include interruption of service, call flooding, and call hijacking.
• Confidentiality: This is used to ensure that information is not accessed by unauthorized persons.
• Integrity: A concern is the verification that the message has not been intercepted and altered. The attacker can potentially alter the message.
• Social Context: This concern addresses the issue in which an attacker misrepresents himself to the victim, thereby creating trust that enables the attacker to be a trusted member of the network.
You might also like to view...
If someone wanted to broadcast a copy of a video presentation, is a circuit switching system or a packet switching preferable? Why?
What will be an ideal response?
You can use the Direct Selection tool to select individual ____ of one vector object.
A. anchor points B. shape modes C. direction lines D. colors
Which of the following statements is false?
a. Files method lines creates a String containing the lines of text from a file. b. Stream method flatMap receives a Function that maps an object into a stream—e.g., a line of text into words. c. Pattern method splitAsStream uses a regular expression to tokenize a String. d. Collectors method groupingBy with three arguments receives a classifier, a Map factory and a downstream Collector.
The Mac desktop appears with preset, or default, settings; however, you can change these settings to suit your needs.
Answer the following statement true (T) or false (F)