Remote users connect to a VPN concentrator for video conferences. Because all email, voice mail, telephony, presence, and messaging has been integrated, a list of security measure has been developed. Which of the following measures does not address unified communications security?

A. creating presence groups
B. restricting IM protocols to the internal network
C. implementing single sign on
D. restrict access to services to local users and VPN users


C
Explanation While single on simplifies the management of passwords by usersm it does not specifically address unified communications issues.

Computer Science & Information Technology

You might also like to view...

Adding the services of one stream to another is known as ________.

a. chaining b. wrapping c. adding d. sequencing

Computer Science & Information Technology

The __________ is the information that is delivered as a unit between MAC users.

A. MSDU B. DS C. MPDU D. BSS

Computer Science & Information Technology

Explain the significance of the pattern string used by the DecimalFormat object, and give an example of a valid pattern.

What will be an ideal response?

Computer Science & Information Technology

Data integrity and ________ are critical issues for most businesses

Fill in the blank(s) with correct word

Computer Science & Information Technology