A security analyst wants to harden the company’s VoIP PBX. The analyst is worried that credentials may be intercepted and compromised when IP phones authenticate with the BPX. Which of the following would best prevent this from occurring?

A. Implement SRTP between the phones and the PBX.
B. Place the phones and PBX in their own VLAN.
C. Restrict the phone connections to the PBX.
D. Require SIPS on connections to the PBX.


Answer: A. Implement SRTP between the phones and the PBX.

Computer Science & Information Technology

You might also like to view...

Consider the signal generated by Equation (10.4) in Problem 12 with c = 0 .1 and denote the signal as f. Create noisy measurements y = f + n by considering zero mean Gaussian noise with standard deviation ?. Retain the signal values of y at nodes 1 to 44 and make signal values at nodes 45 to 50 to zero. Now the goal is to recover the true signal f from y, where five signal values are missing. Using the results of Problem 16, find the inpainted signal and compute the RMSE for the following cases:

Computer Science & Information Technology

Which of the following can automate the steps needed to open a form and navigate to a new, blank record?

A) A macro B) A navigation form C) A query D) A subform

Computer Science & Information Technology

3G wireless offers data transfer rates of up to ____ Mbps.

A. ?1 B. ?2 C. ?5 D. ?20

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. Numerical data includes all integer numbers and all real numbers. 2. Character data includes all numerical data. 3. True (T, y, or yes) and False (F, n, or no) are the only values in the logical data set. 4. An equation and an expression are the same thing. 5. A function is a set of instructions to input data into the computer.

Computer Science & Information Technology