Possible security steps to protect and secure a VoIP network include which of the following:
a. Encrypting the VoIP data traffic
b. Using firewalls to prevent attacks
c. Routing VoIP data traffic on the same LANs as normal data traffic
d. All the above
a. Encrypting the VoIP data traffic and b. Using firewalls to prevent attacks
Explanation: Possible security steps to protect and secure a VoIP network include encrypting the VoIP data traffic, using firewalls to prevent attacks, and routing VoIP data traffic on separate LANs than normal data traffic.
You might also like to view...
Which of the following statements is false?
a. Names for structure types are often defined with typedef to create more readable type names. b. The statement typedef Card* CardPtr; defines the new type name CardPtr as a synonym for type Card*. c. Creating a new name with typedef does not create a new type; typedef simply creates a new type name that can then be used in the program as an alias for an existing type name. d. C++11 added the keyword using as another mechanism for creating type aliases. The following declaration is equivalent to the typedef in part b): using Card* = CardPtr;
Unless you filter the table, by default when you export an Access table to Excel, all fields and records are exported.
Answer the following statement true (T) or false (F)