Which of the following is a threat to a VoIP network?

a. Call flooding.
b. Information is accessed by unauthorized persons.
c. Attacker becoming a trusted member of the network.
d. All the above are threats.

d. All the above are threats.
Explanation: The most common categories of threats include the following;
• Availability: Phone systems are intended to be in operation 24x7 . This means that any threat to availability is a concern. Threats of this type can include interruption of service, call flooding, and call hijacking.
• Confidentiality: This is used to ensure that information is not accessed by unauthorized persons.
• Integrity: A concern is the verification that the message has not been intercepted and altered. The attacker can potentially alter the message.
• Social Context: This concern addresses the issue in which an attacker misrepresents himself to the victim, thereby creating trust that enables the attacker to be a trusted member of the network.

Computer Science & Information Technology

You might also like to view...

A(n)__________ heat sink with a fan is usually required for adequate CPU cooling

a. AMD b. Active c. Passive d. Intel

Computer Science & Information Technology

The acronym RISC stands for __________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology