Question
QUESTION 1
Which of the following protocols can be used by a device located behind the NAT function on a subnet using non-routable IP addresses to ensure that the device's IP address is contained in the NAT function's translation table? (Select all that apply)
a. RTP
b. SIP
c. STUN
d. TURN
e. ICE

QUESTION 2
Which of the following methods are used by attackers to deliver malware via instant Messaging (IM)? (Select all that apply)
a. social engineering via a message containing a phrase like "Click here to get a great antivirus tool" from a contact on the recipient's contact list
b. delivering a message with socially engineered content containing a web address (URL) containing active malicious code
c. sending specially crafted messages exploiting security vulnerabilities in the client software
d. sending a file transfer with a virus-infected file
e. social engineering via a message containing a phrase like "Click here to see pics of me from vacation!" from a contact on the recipient's contact list

QUESTION 3
Which of the following protocols can be used to retrieve VoIP user agent (UA) customer profiles while providing authentication and confidentiality for profile access and transfer? (Select all that apply)
a. HTTP
b. SNMP
c. FTP
d.SFTP
e.HTTPS
f. TFTP

QUESTION 4
Please provide a short description of what remote system logging is.

QUESTION 5
Please identify 4 items that should be covered in a security lifecycle review.

QUESTION 6
Which of the following authentication mechanisms can be used by different versions of SNMP? (Select all that apply)
a. SNMPv2 can be authenticated using a Community String
b. SNMPv2c can be authenticated using IPsec
c. SNMPv3 can be authenticated using a Community String
d. SNMPv1 can be authenticated using a Community String
e. SNMPv2c can be authenticated using a MD5 MAC
f. SNMPv2 can be authenticated using a MD5 MAC
g. SNMPv2 can be authenticated using IPsec
h. SNMPv1 can be authenticated using IPsec
i. SNMPv3 can be authenticated using a MD5 MAC
j. SNMPv1 can be authenticated using a MD5 MAC
k. SNMPv2c can be authenticated using a Community String
I. SNMPv3 can be authenticated using IPsec

QUESTION 7
Is it true that the PSTN uses an end-to-end approach for telephone calls?
True
False

QUESTION 8
What are the primary targets within Voice over IP (VoIP)?

QUESTION 9
Please provide a short description of the security advantages provided by remote system logging.

QUESTION 10
Which of the following protocols are commonly used for remote management of devices over a network? (Select all that apply)
a. SIP
b. SMTP
c. SNMP
d. SSH
e. FTP

QUESTION 11
Please provide a short description of what SEMs, SIMs, SIEMs are.

QUESTION 12
Which of the following authentication mechanisms are used by DHCP option 90? (Select all that apply)
a. SSH
b. TLS
c. Delayed authentication via HMAC-MD5
d. Configuration token
e. IPsec

QUESTION 13
Can a session border control function (SBC) located in front of a NAT function assist with making a device callable (reachable) for VoIP services if the device is located behind a NAT function on a subnet using a non-routable IP address?

QUESTION 14
Please provide a short description that describes what Information Security (InfoSec) policies are, what Information Security (InfoSec) procedures are and how InfoSec policies differ from InfoSec procedures.
Solution Preview

These solutions may offer step-by-step problem-solving explanations or good writing examples that include modern styles of formatting and construction of bibliographies out of text citations and references.
Students may use these solutions for personal skill-building and practice.
Unethical use is strictly forbidden.

1 - c, d, e
2 - b, c, d
3 - d, e
This is only a preview of the solution.
Please use the purchase button to see the entire solution.
Purchase Solution
$50.00
Google Pay
Amazon
Paypal
Mastercard
Visacard
Discover
Amex
View Available Earth Science Tutors 640 tutors matched
Ionut
(ionut)
Master of Computer Science
Hi! MSc Applied Informatics & Computer Science Engineer. Practical experience in many CS & IT branches.Research work & homework
5/5 (6,804+ sessions)
1 hour avg response
$15-$50 hourly rate
Pranay
(math1983)
Doctor of Philosophy (PhD)
Ph.D. in mathematics and working as an Assistant Professor in University. I can provide help in mathematics, statistics and allied areas.
4.6/5 (6,681+ sessions)
1 hour avg response
$40-$50 hourly rate
Leo
(Leo)
Doctor of Philosophy (PhD)
Hi! I have been a professor in New York and taught in a math department and in an applied math department.
4.9/5 (6,428+ sessions)
2 hours avg response

Similar Homework Solutions