You should implement all of the following security features to help defend internet protocol (IP) telephony systems from attackers except

a. enabling access control lists (ACL) on firewalls, routers, and switches.
b. deploying protection from dynamic host configuration protocol (DHCP) spoofing.
c. consolidating your voice with your data using virtual local area networks (VLAN).
d. enabling port security access to only allow the required devices needed by the client.


Ans: c. consolidating your voice with your data using virtual local area networks (VLAN).

Trades & Technology

You might also like to view...

The most common form types encountered on most job sites are wall forms and _____.

a. architectural forms b. column forms c. climbing forms d. stair forms

Trades & Technology

Producers can use linear classification information to select bulls for artificial ____________________, which yields many offspring.

Fill in the blank(s) with the appropriate word(s).

Trades & Technology

Empty disposable R-134a refrigerant containers should be:

A) disposed of according to SAE J2196 B) evacuated into a recovery/recycling machine C) flushed with R-152a refrigerant D) flushed with R-134a refrigerant

Trades & Technology

Two elements, branches, or networks are in series if they have two points in common

Indicate whether the statement is true or false

Trades & Technology