A security analyst wants to harden the company’s VoIP PBX. The analyst is worried that credentials may be intercepted and compromised when IP phones authenticate with the BPX. Which of the following would best prevent this from occurring?
A. Implement SRTP between the phones and the PBX.
B. Place the phones and PBX in their own VLAN.
C. Restrict the phone connections to the PBX.
D. Require SIPS on connections to the PBX.
Answer: A. Implement SRTP between the phones and the PBX.
Computer Science & Information Technology
You might also like to view...
Embedded styles are handy when you want a particular page in your website to contain formatting that is different from the rules specified in an external style sheet.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Laptop computers tend to be more costly than desktop computers due to _____.
A. the cost of their components B. the software installed C. the size of their keyboards D. their performance
Computer Science & Information Technology