Voice, Video, and Collaboration Flashcards

4.3.1

1
Q

Voice over Internet Protocol (VoIP)

A

set of technologies that enables voice to be sent over a packet network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Session Initiation Protocol

A

Signaling protocol used for initiating, maintaining, and terminating communication sessions that include voice and messaging applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

VOIP Attacks vectors

A

Spoof Caller ID which facilitates vishing (VoIP phishing) or Spam over Internet Telephony(SPIT)
Call management systems and VOIP phones can be vulnerable to host operating systems and DoS attacks
MIMT may succeed by spoofing call managers or endpoint connection transmission
Unencrypted network traffic may include VoIP which makes decoding VoIP streams possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Zoombombing

A

unwanted intrusion by an outsider into a video conference call.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security measures to zoombombing

A

Access Controls such as virtual waiting rooms, password protected virtual meetings, and screensharing restrictions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Instant Messaging (IM) vulnerabilities

A

Does not enforce strong authentication; can be spoofed
No encryption;packet sniffing
File Transfer and remote access; risk of malicious code deposit
Social Engineering Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Email Security Goals

A

Secure placement of email servers and gateways on network
Ensure nonrepudiation
Achieve privacy and confidentiality
Classify sensitive content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Email Security Solutions

A

Digital Signatures
Anti Malware Scanning
Block suspicious attachments
Filters
Encryption
Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly