QuestionQuestion

QUESTION 1
Which of the following protocols can be used by a device located behind the NAT function on a subnet using non-routable IP addresses to ensure that the device's IP address is contained in the NAT function's translation table? (Select all that apply)
a. RTP
b. SIP
c. STUN
d. TURN
e. ICE

QUESTION 2
Which of the following methods are used by attackers to deliver malware via instant Messaging (IM)? (Select all that apply)
a. social engineering via a message containing a phrase like "Click here to get a great antivirus tool" from a contact on the recipient's contact list
b. delivering a message with socially engineered content containing a web address (URL) containing active malicious code
c. sending specially crafted messages exploiting security vulnerabilities in the client software
d. sending a file transfer with a virus-infected file
e. social engineering via a message containing a phrase like "Click here to see pics of me from vacation!" from a contact on the recipient's contact list

QUESTION 3
Which of the following protocols can be used to retrieve VoIP user agent (UA) customer profiles while providing authentication and confidentiality for profile access and transfer? (Select all that apply)
a. HTTP
b. SNMP
c. FTP
d.SFTP
e.HTTPS
f. TFTP

QUESTION 4
Please provide a short description of what remote system logging is.

QUESTION 5
Please identify 4 items that should be covered in a security lifecycle review.

QUESTION 6
Which of the following authentication mechanisms can be used by different versions of SNMP? (Select all that apply)
a. SNMPv2 can be authenticated using a Community String
b. SNMPv2c can be authenticated using IPsec
c. SNMPv3 can be authenticated using a Community String
d. SNMPv1 can be authenticated using a Community String
e. SNMPv2c can be authenticated using a MD5 MAC
f. SNMPv2 can be authenticated using a MD5 MAC
g. SNMPv2 can be authenticated using IPsec
h. SNMPv1 can be authenticated using IPsec
i. SNMPv3 can be authenticated using a MD5 MAC
j. SNMPv1 can be authenticated using a MD5 MAC
k. SNMPv2c can be authenticated using a Community String
I. SNMPv3 can be authenticated using IPsec

QUESTION 7
Is it true that the PSTN uses an end-to-end approach for telephone calls?
True
False

QUESTION 8
What are the primary targets within Voice over IP (VoIP)?

QUESTION 9
Please provide a short description of the security advantages provided by remote system logging.

QUESTION 10
Which of the following protocols are commonly used for remote management of devices over a network? (Select all that apply)
a. SIP
b. SMTP
c. SNMP
d. SSH
e. FTP

QUESTION 11
Please provide a short description of what SEMs, SIMs, SIEMs are.

QUESTION 12
Which of the following authentication mechanisms are used by DHCP option 90? (Select all that apply)
a. SSH
b. TLS
c. Delayed authentication via HMAC-MD5
d. Configuration token
e. IPsec

QUESTION 13
Can a session border control function (SBC) located in front of a NAT function assist with making a device callable (reachable) for VoIP services if the device is located behind a NAT function on a subnet using a non-routable IP address?

QUESTION 14
Please provide a short description that describes what Information Security (InfoSec) policies are, what Information Security (InfoSec) procedures are and how InfoSec policies differ from InfoSec procedures.

Solution PreviewSolution Preview

These solutions may offer step-by-step problem-solving explanations or good writing examples that include modern styles of formatting and construction of bibliographies out of text citations and references. Students may use these solutions for personal skill-building and practice. Unethical use is strictly forbidden.

1 - c, d, e
2 - b, c, d
3 - d, e...
$50.00
for this solution

PayPal, G Pay, ApplePay, Amazon Pay, and all major credit cards accepted.

Find A Tutor

View available Disaster Studies Tutors

Get College Homework Help.

Are you sure you don't want to upload any files?

Fast tutor response requires as much info as possible.

Decision:
Upload a file
Continue without uploading

SUBMIT YOUR HOMEWORK
We couldn't find that subject.
Please select the best match from the list below.

We'll send you an email right away. If it's not in your inbox, check your spam folder.

  • 1
  • 2
  • 3
Live Chats