What allows you to make voice calls over a computer network?

A. Satellites
B. Tunneling
C. Encryption
D. VoIP
E. What is the most common VoIP application protocol?
F. SSH
G. SIP
H. SSL
I. SFTP


Answer: F

Computer Science & Information Technology

You might also like to view...

A(n) ________ file is a file in which pieces of the file are scattered over different areas of the hard drive

Fill in the blank(s) with correct word

Computer Science & Information Technology

?Microsoft Edge is __________. 

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

While typing in a cell, you can press the _________________________ key to delete all the characters back to and including the incorrect character you just typed.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Your instance is associated with two security groups. The first allows Remote Desktop Protocol (RDP) access over port 3389 from Classless Inter-Domain Routing (CIDR) block 72.14.0.0/16. The second allows HTTP access over port 80 from CIDR block 0.0.0.0/0. What traffic can reach your instance?

A. RDP and HTTP access from CIDR block 0.0.0.0/0 B. No traffic is allowed. C. RDP and HTTP traffic from 72.14.0.0/16 D. RDP traffic over port 3389 from 72.14.0.0/16 and HTTP traffic over port 80 from 0.0.00/0

Computer Science & Information Technology