It is easy for the attacker to intercept VoIP calls. True or false?
a. True
b. False
b. False
Explanation: It actually takes someone who is technically sophisticated to intercept VoIP telephone calls. VoIP systems have two possible types of vulnerabilities. The first is the level of network security running the VoIP data traffic. Threats of intrusion and denial-of-service for VoIP networks are the same that exist in a traditional data network. A well-protected infrastructure can help to better secure the network.
You might also like to view...
Related data points that are represented by data markers are called a(n) ________
Fill in the blank(s) with correct word
Which Cisco IOS command is used to disable EIGRP for IPv6 auto-summary?
A) no auto-summary B) no ipv6 auto-summary C) EIGRP for IPv6 doesn't have auto-summary D) ipv6 auto-summary disable