IS3445 CHAP 14 SECURING PERSONAL AND BUSINESS COMMUNICATIONS Flashcards
____ is how mobil phones handle Web and multimedia content intended for more powerful systems with larger screens.
Content adaptation
____ is a delay. It can apply to the sending, processing, transmission, storage, or receiving of information.
Latency
____ is a specification from the Open Mobile Alliance. The specification details implementation requirements for any organization interested in providing MMS.
Multimedia Messaging Service Encapsulation Protocol
____ is presence information aggregated from several devices to a single presence status. The reported status is provided to other users.
(MPOP) Multiple Points of Presence
____ is the ability and willingness of an end user to engage in communication.
The inför is controlled by the end user and gives real-time confidence that the user is accessible.
Presence and availability
____ is the protocol used for streaming audio or video in packets over an IP network.
(RTP) Real-time Transport Protocol
____ is a network endpoint that is enabled to function as either a SIP user agent client, or a user agent server.
SIP user agent (UA)
SIP user ____ makes requests and receives responses.
SIP user agent client (UAC)
SIP user ____ acts as a proxy between two SIP user agent clients for the purpose of facilitating a SIP session. This acts as both client and server to receive and forward session control requests and responses.
SIP user agent server (UAS)
____ is the technique of relaying communications between two or more users by intermediate storage.
Delivery from sender to a central storage is immediate, but the final transmission to the recipient depends on availability and a request for the stored info.
Store-and-forward communication
- When information is temporarily kept at one or more middle points during transmission, that technique is called ___ communication.
Store-and-Forward
- Which of the following describes Multiple Points of Presence (MPOP)?
- Aggregating multiple email accounts to your current logged on account
- Aggregating presence information from multiple applications or devices
- Dividing voice mail to lessen the risk of eavesdropping
- Dividing MMS messages to separate text and graphics or video pieces
Aggregating presence information from multiple applications or devices
- Phishing, social engineering, and 419 scams are some of the threats encountered when using ___.
- Social networking site messages or chats can be considered very private and secure.
TRUE OR FALSE
FALSE
- Why are PBXs an attractive target to attackers?
- Several services depend on the PBXs operation
- Numerous protocols are involved
- The device is usually left out in the open
- All the above
- 1 & 2 only
Several services depend on the PBXs operation
Numerous protocols are involved
- Store-and-forward communication is preferred over real-time communication in which environments? (Select two)
- When delivery is unreliable
- When the destination is not always available
- When source and destination are not in the same country
- When low latency is critical
When delivery is unreliable
When the destination is not always available
- Which of the following are primary threats internet in fax machines? (Select two)
- Fax machines are too heavy for safe lifting by one person
- Hard drives storing faxes are not wiped prior to disposal
- Fax paper is lighter wight, posing a larger risk of paper cuts
- Poor physical security leaves confidential faxes unprotected
Hard drives storing faxes are not wiped prior to disposal
Poor physical security leaves confidential faxes unprotected
- Which areas of concern are associated with SMS vulnerabilities?(Select two)
- Availability
- Integrity
- Confidentiality
- All the above
Integrity
Confidentiality
- SMS and MMS are primarily the same service apart from the addition of multimedia with MMS.
TRUE OR FALSE
FALSE
- Protocols such as SIP.H323.MGCP.IP. and RTP are encountered when discussing which of the following?
- Voice mail
- VoIP
- Fax
- SMS
Fax
- This chapter discussed which issues brought on by adding VoIP devices to an organization? (Select two)
- Performance issues: significantly more network traffic
- Security issues: new attack vectors and more vulnerabilities to deal with
- User-related issues:users require additional training and might be less productive
- Facility issues: finding the space to put the phones
Performance issues: significantly more network traffic
Security issues: new attack vectors and more vulnerabilities to deal with
- A networking method of segregating VoIP traffic from data traffic is ___.
Virtual local area networks or VLANs
- Select one way the SIP protocol does not assist with establishing a multimedia connection.
- User availability
- User location
- User capabilities
- User distance
User distance
- The SIP protocol manages multimedia sessions with features similar to how the telephone system dials, rings, and manages responses from phones.
TRUE OR FALSE
TRUE
- The SIP session request and response messages are formed similarly to ___ messages.
- DHCP
- DNS
- HTTP
- SNMP
HTTP