SIP Security

Exit

Question 1 of 1

  Time Left


0 [{"id":151329,"quiz_id":"9595","answer_id":null,"answerType_id":"0","created_at":"2017-01-06 14:44:23","updated_at":"2017-01-06 14:44:45","questionName":"SRTP is used to secure Video and Voice","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":10,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":151325,"quiz_id":"9595","answer_id":null,"answerType_id":"0","created_at":"2017-01-06 14:39:43","updated_at":"2017-01-06 14:44:45","questionName":"When using a SIPS address and subsequently requesting a secure session, which protocol combination would be used?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":6,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":151319,"quiz_id":"9595","answer_id":null,"answerType_id":"0","created_at":"2017-01-06 14:32:01","updated_at":"2017-01-06 14:44:45","questionName":"S\/MIME cann't be used for encryption with the SDP Body as it's only useful when encrypting emails","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":0,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":151322,"quiz_id":"9595","answer_id":null,"answerType_id":"0","created_at":"2017-01-06 14:34:35","updated_at":"2017-01-06 14:44:45","questionName":"SRTP requires a PKI in order to work","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":3,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":151326,"quiz_id":"9595","answer_id":null,"answerType_id":"0","created_at":"2017-01-06 14:40:29","updated_at":"2017-01-06 14:44:45","questionName":"Using TLS will ensure that both Voice and Signaling are encrypted ","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":7,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":151320,"quiz_id":"9595","answer_id":null,"answerType_id":"0","created_at":"2017-01-06 14:33:08","updated_at":"2017-01-06 14:44:45","questionName":"Which element in the SDP Body of a SIP message is used for carrying the encryption key for SRTP?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":1,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":151323,"quiz_id":"9595","answer_id":null,"answerType_id":"0","created_at":"2017-01-06 14:37:25","updated_at":"2017-01-06 14:44:45","questionName":"If a PROXY Server in the path of a SIP calls that requires TLS security doesn't support TLS, what happ, what happens to the call?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":4,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":151321,"quiz_id":"9595","answer_id":null,"answerType_id":"0","created_at":"2017-01-06 14:34:01","updated_at":"2017-01-06 14:44:45","questionName":"A Certificate includes a copy of the Secure Server's own Public Key","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":2,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":151324,"quiz_id":"9595","answer_id":null,"answerType_id":"0","created_at":"2017-01-06 14:38:24","updated_at":"2017-01-06 14:44:45","questionName":"MD5 is hasshing algorithm used during the Authentication process beteween a SIP UA and Server","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":5,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":151327,"quiz_id":"9595","answer_id":null,"answerType_id":"0","created_at":"2017-01-06 14:41:43","updated_at":"2017-01-06 14:44:45","questionName":"Which port is the Secure port on a Server supporting HTTPS?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":8,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":151328,"quiz_id":"9595","answer_id":null,"answerType_id":"0","created_at":"2017-01-06 14:43:44","updated_at":"2017-01-06 14:44:45","questionName":"If a SIP PROXY requires account details from a SIP UA, what does it return to the UA after the initial INVITE is sent to the PROXY","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":9,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null}]
151329
0
120
block

SRTP is used to secure Video and Voice

Select the Correct Answers  

(0/0)








151325
0
120
none
151319
0
120
none
151322
0
120
none
151326
0
120
none
151320
0
120
none
151323
0
120
none
151321
0
120
none
151324
0
120
none
151327
0
120
none
151328
0
120
none