3.5: Voice Over IP Flashcards

1
Q

Trunking

A

Trunks can connect an organization’s private branch exchange (PBX) to telecommunications providers that offer VoIP trunking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are trunks

A

telecommunications circuits designed to carry several simultaneous telephone conversations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

VoIP Threats and Vulnerabilities

A

VOIP systems are connected to the TCP/IP network thus is vulnerable to all types of attacks that plague workstations and servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Type of Threats and Vulnerabilities

A
  • Eavesdropping -
  • Spoofing
  • Malware
  • Denial of service
  • Toll fraud - Attack designed to steal long-distance service by using another organization’s telephone network for one’s personal use.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How to protect VOIP

A

Because VoIP systems communicate over TCP/IP, and because many are based on conventional operating systems, VoIP is protected through primarily the same measures that are used to protect other IT systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Private Bank Exchange (PBX)

A

It’s a private telephone switch used by an organization to manage its internal telephone calls, as well as telephone calls with parties in the public telephone network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PBX Threats and vulnerabilities

A
  • Default Passwords on an administrator console
  • Dial -in modem - dial-in using default password or no authentication at all.
  • Toll fraud
  • Espionage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PBX countermeasures

A
  • Admin access control
  • Physical access control
  • Regular log reviews
  • Calling restriction
How well did you know this?
1
Not at all
2
3
4
5
Perfectly