IS3445 CHAP 14 SECURING PERSONAL AND BUSINESS COMMUNICATIONS Flashcards Preview

IS3445 SEC WEB APPS > IS3445 CHAP 14 SECURING PERSONAL AND BUSINESS COMMUNICATIONS > Flashcards

Flashcards in IS3445 CHAP 14 SECURING PERSONAL AND BUSINESS COMMUNICATIONS Deck (25)
Loading flashcards...
1
Q

____ is how mobil phones handle Web and multimedia content intended for more powerful systems with larger screens.

A

Content adaptation

2
Q

____ is a delay. It can apply to the sending, processing, transmission, storage, or receiving of information.

A

Latency

3
Q

____ is a specification from the Open Mobile Alliance. The specification details implementation requirements for any organization interested in providing MMS.

A

Multimedia Messaging Service Encapsulation Protocol

4
Q

____ is presence information aggregated from several devices to a single presence status. The reported status is provided to other users.

A

(MPOP) Multiple Points of Presence

5
Q

____ is the ability and willingness of an end user to engage in communication.
The inför is controlled by the end user and gives real-time confidence that the user is accessible.

A

Presence and availability

6
Q

____ is the protocol used for streaming audio or video in packets over an IP network.

A

(RTP) Real-time Transport Protocol

7
Q

____ is a network endpoint that is enabled to function as either a SIP user agent client, or a user agent server.

A

SIP user agent (UA)

8
Q

SIP user ____ makes requests and receives responses.

A

SIP user agent client (UAC)

9
Q

SIP user ____ acts as a proxy between two SIP user agent clients for the purpose of facilitating a SIP session. This acts as both client and server to receive and forward session control requests and responses.

A

SIP user agent server (UAS)

10
Q

____ is the technique of relaying communications between two or more users by intermediate storage.
Delivery from sender to a central storage is immediate, but the final transmission to the recipient depends on availability and a request for the stored info.

A

Store-and-forward communication

11
Q
  1. When information is temporarily kept at one or more middle points during transmission, that technique is called ___ communication.
A

Store-and-Forward

12
Q
  1. Which of the following describes Multiple Points of Presence (MPOP)?
  2. Aggregating multiple email accounts to your current logged on account
  3. Aggregating presence information from multiple applications or devices
  4. Dividing voice mail to lessen the risk of eavesdropping
  5. Dividing MMS messages to separate text and graphics or video pieces
A

Aggregating presence information from multiple applications or devices

13
Q
  1. Phishing, social engineering, and 419 scams are some of the threats encountered when using ___.
A

Email

14
Q
  1. Social networking site messages or chats can be considered very private and secure.
    TRUE OR FALSE
A

FALSE

15
Q
  1. Why are PBXs an attractive target to attackers?
  2. Several services depend on the PBXs operation
  3. Numerous protocols are involved
  4. The device is usually left out in the open
  5. All the above
  6. 1 & 2 only
A

Several services depend on the PBXs operation

Numerous protocols are involved

16
Q
  1. Store-and-forward communication is preferred over real-time communication in which environments? (Select two)
  2. When delivery is unreliable
  3. When the destination is not always available
  4. When source and destination are not in the same country
  5. When low latency is critical
A

When delivery is unreliable

When the destination is not always available

17
Q
  1. Which of the following are primary threats internet in fax machines? (Select two)
  2. Fax machines are too heavy for safe lifting by one person
  3. Hard drives storing faxes are not wiped prior to disposal
  4. Fax paper is lighter wight, posing a larger risk of paper cuts
  5. Poor physical security leaves confidential faxes unprotected
A

Hard drives storing faxes are not wiped prior to disposal

Poor physical security leaves confidential faxes unprotected

18
Q
  1. Which areas of concern are associated with SMS vulnerabilities?(Select two)
  2. Availability
  3. Integrity
  4. Confidentiality
  5. All the above
A

Integrity

Confidentiality

19
Q
  1. SMS and MMS are primarily the same service apart from the addition of multimedia with MMS.
    TRUE OR FALSE
A

FALSE

20
Q
  1. Protocols such as SIP.H323.MGCP.IP. and RTP are encountered when discussing which of the following?
  2. Email
  3. Voice mail
  4. VoIP
  5. Fax
  6. SMS
A

Fax

21
Q
  1. This chapter discussed which issues brought on by adding VoIP devices to an organization? (Select two)
  2. Performance issues: significantly more network traffic
  3. Security issues: new attack vectors and more vulnerabilities to deal with
  4. User-related issues:users require additional training and might be less productive
  5. Facility issues: finding the space to put the phones
A

Performance issues: significantly more network traffic

Security issues: new attack vectors and more vulnerabilities to deal with

22
Q
  1. A networking method of segregating VoIP traffic from data traffic is ___.
A

Virtual local area networks or VLANs

23
Q
  1. Select one way the SIP protocol does not assist with establishing a multimedia connection.
  2. User availability
  3. User location
  4. User capabilities
  5. User distance
A

User distance

24
Q
  1. The SIP protocol manages multimedia sessions with features similar to how the telephone system dials, rings, and manages responses from phones.
    TRUE OR FALSE
A

TRUE

25
Q
  1. The SIP session request and response messages are formed similarly to ___ messages.
  2. DHCP
  3. DNS
  4. HTTP
  5. SNMP
A

HTTP