List of questions
Related questions
Question 1430 - CISSP discussion
Which of the following would be the BEST mitigation practice for man-in-the-middle (MITM) Voice over Internet Protocol (VoIP) attacks?
A.
Use Media Gateway Control Protocol (MGCP)
B.
Use Transport Layer Security (TLS) protocol
C.
Use File Transfer Protocol (FTP)
D.
Use Secure Shell (SSH) protocol
Your answer:
0 comments
Sorted by
Leave a comment first