IS3445 CHAP 14 SECURING PERSONAL AND BUSINESS COMMUNICATIONS Flashcards
____ is how mobil phones handle Web and multimedia content intended for more powerful systems with larger screens.
Content adaptation
____ is a delay. It can apply to the sending, processing, transmission, storage, or receiving of information.
Latency
____ is a specification from the Open Mobile Alliance. The specification details implementation requirements for any organization interested in providing MMS.
Multimedia Messaging Service Encapsulation Protocol
____ is presence information aggregated from several devices to a single presence status. The reported status is provided to other users.
(MPOP) Multiple Points of Presence
____ is the ability and willingness of an end user to engage in communication.
The inför is controlled by the end user and gives real-time confidence that the user is accessible.
Presence and availability
____ is the protocol used for streaming audio or video in packets over an IP network.
(RTP) Real-time Transport Protocol
____ is a network endpoint that is enabled to function as either a SIP user agent client, or a user agent server.
SIP user agent (UA)
SIP user ____ makes requests and receives responses.
SIP user agent client (UAC)
SIP user ____ acts as a proxy between two SIP user agent clients for the purpose of facilitating a SIP session. This acts as both client and server to receive and forward session control requests and responses.
SIP user agent server (UAS)
____ is the technique of relaying communications between two or more users by intermediate storage.
Delivery from sender to a central storage is immediate, but the final transmission to the recipient depends on availability and a request for the stored info.
Store-and-forward communication
- When information is temporarily kept at one or more middle points during transmission, that technique is called ___ communication.
Store-and-Forward
- Which of the following describes Multiple Points of Presence (MPOP)?
- Aggregating multiple email accounts to your current logged on account
- Aggregating presence information from multiple applications or devices
- Dividing voice mail to lessen the risk of eavesdropping
- Dividing MMS messages to separate text and graphics or video pieces
Aggregating presence information from multiple applications or devices
- Phishing, social engineering, and 419 scams are some of the threats encountered when using ___.
- Social networking site messages or chats can be considered very private and secure.
TRUE OR FALSE
FALSE
- Why are PBXs an attractive target to attackers?
- Several services depend on the PBXs operation
- Numerous protocols are involved
- The device is usually left out in the open
- All the above
- 1 & 2 only
Several services depend on the PBXs operation
Numerous protocols are involved