You should implement all of the following security features to help defend internet protocol (IP) telephony systems from attackers except
a. enabling access control lists (ACL) on firewalls, routers, and switches.
b. deploying protection from dynamic host configuration protocol (DHCP) spoofing.
c. consolidating your voice with your data using virtual local area networks (VLAN).
d. enabling port security access to only allow the required devices needed by the client.
Ans: c. consolidating your voice with your data using virtual local area networks (VLAN).
You might also like to view...
The most common form types encountered on most job sites are wall forms and _____.
a. architectural forms b. column forms c. climbing forms d. stair forms
Producers can use linear classification information to select bulls for artificial ____________________, which yields many offspring.
Fill in the blank(s) with the appropriate word(s).
Empty disposable R-134a refrigerant containers should be:
A) disposed of according to SAE J2196 B) evacuated into a recovery/recycling machine C) flushed with R-152a refrigerant D) flushed with R-134a refrigerant
Two elements, branches, or networks are in series if they have two points in common
Indicate whether the statement is true or false