Level 27 Level 29
Level 28

391 - 405


15 words 0 ignored

Ready to learn       Ready to review

Ignore words

Check the boxes below to ignore/unignore words, then click save at the bottom. Ignored words will never appear in any learning session.

All None

Ignore?
Two common types of tunneling include
Point-to-point tunneling protocol (PPTP) and Layer 2 tunneling protocol
Point-to-point tunneling protocol (PPTP)
A Layer 2 protocol developed by Microsoft that encapsulates
Layer 2 tunneling protocol (L2TP)
A protocol that encapsulates point-to-point protocol data and is
voice communications
Users often expect they are confidential
Any VoIP device
Is an IP device, it is vulnerable to the same types of attacks as any other IP device.
VoIP networks
Are still vulnerable to sniffing, DoS, traffic-flow disruption and toll fraud
Sniffing
Would allow the disclosure of sensitive information,
Port scanning
Is often a precursor to a potential sniffing of the VoIP network
the ability to network sniff
Is becoming easier as many tools are readily available from open source web sites
DoS, or the flooding of the data network with data
Is a common issue in the protection of data networks but
The IP end point
Is often overlooked, but it can be singled out as a point of attack and flooded with data,
Traffic flow disruption
Allows further exploitation of the previous two vulnerabilities, whereas the redirecting
Voice packets
Travel "in the clear" over IP networks, so they may be vulnerable to unauthorized sniffing
Unless network-based encryption is used
All voice RTP packets travel in the clear over the network and could be
scheduled downtime in telephony
Doesn't exist