Filters
Question type

Study Flashcards

NAT adds latency to VoIP packets.

Correct Answer

verifed

verified

The first task in security is to understand the environment to be protected.

Correct Answer

verifed

verified

VoIP security can easily be implemented even if the company's basic security is weak.

Correct Answer

verifed

verified

In a SQL injection attack, attackers may use lookup commands to obtain unauthorized information.

Correct Answer

verifed

verified

With Active-X controls, active scripting is enabled by default.

Correct Answer

verifed

verified

To take advantage of user typing errors, attackers register site names that are similar to those of legitimate domain names.

Correct Answer

verifed

verified

Signaling is the carriage of voice between two parties.

Correct Answer

verifed

verified

Baselines are used to go beyond default installation configurations for high-value targets.

Correct Answer

verifed

verified

Signaling does not consist of communication to manage the network.

Correct Answer

verifed

verified

SIP Identity protocols ________.


A) ensure that traffic is authenticated between two companies holding public/private keys
B) are uncommon on IP telephones
C) Both A and B
D) Neither A nor B

Correct Answer

verifed

verified

Cookies can used to track users at a website.

Correct Answer

verifed

verified

Encryption is heavily used in commercial e-mail.

Correct Answer

verifed

verified

In a stack overflow attack, to where does the return address point?


A) To the beginning of the stack entry's data area
B) To the end of the stack entry's data area
C) To the next command in the program being hacked
D) To the return address entry in the stack entry

Correct Answer

verifed

verified

In VoIP, firewalls are a problem because they tend to ________.


A) reduce throughput
B) increase jitter
C) increase latency
D) make traffic unreadable

Correct Answer

verifed

verified

SIP identity protocols are common on IP telephones.

Correct Answer

verifed

verified

In VoIP, encryption may ________.


A) reduce throughput
B) increase jitter
C) increase latency
D) make traffic unreadable

Correct Answer

verifed

verified

Skype's security protocols have been publicly studied and approved.

Correct Answer

verifed

verified

Experts advise firms to turn on most or all applications and then harden them.

Correct Answer

verifed

verified

DoS attacks against VoIP can be successful even if they increase latency only slightly.

Correct Answer

verifed

verified

Overall for firms, which is more time consuming to patch?


A) Applications
B) Operating systems
C) Both are about equally time consuming to patch
D) None of the above

Correct Answer

verifed

verified

Showing 81 - 100 of 100

Related Exams

Show Answer