Which of the following should be used to implement voice encryption?
A. SSLv3
B. VDSL
C. SRTP
D. VoIP
Answer: C. SRTP
Computer Science & Information Technology
You might also like to view...
Does the Korn shell support recursive functions?
What will be an ideal response?
Computer Science & Information Technology
Of letters, spreadsheets, reports, and books, they all usually use portrait orientation except ____________________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Which of the following is not a permanent storage option?
A. External hard drive B. Random access memory C. Internal hard drive D. SSD
Computer Science & Information Technology
Word uses the ____, also called a namespace, to refer to a schema.
A. URI B. URL C. URx D. URM
Computer Science & Information Technology