Which of the following should be used to implement voice encryption?

A. SSLv3
B. VDSL
C. SRTP
D. VoIP


Answer: C. SRTP

Computer Science & Information Technology

You might also like to view...

Does the Korn shell support recursive functions?

What will be an ideal response?

Computer Science & Information Technology

Of letters, spreadsheets, reports, and books, they all usually use portrait orientation except ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is not a permanent storage option?

A. External hard drive B. Random access memory C. Internal hard drive D. SSD

Computer Science & Information Technology

Word uses the ____, also called a namespace, to refer to a schema.

A. URI B. URL C. URx D. URM

Computer Science & Information Technology