Tech Quiz of the Day

Sep 30 2009   1:30PM GMT

VoIP security quiz



Posted by: Margaret Rouse
Tags:
“The major threats a company faces in using VoIP is that, when improperly implemented, eavesdropping is pretty easy.”

Randy Abrams, Threats On The Move

How does VoIP work?

When you call a number, a VoIP adapter logs on to a  routing server.  The VoIP adaptor is provided by your VoIP service provider.  It might be a software program, a phone jack that plugs into your computer or a dedicated VoIP phone.

The routing server looks up the IP number that’s associated with the destination phone number and makes the connection.  If the destination number isn’t using VoIP, the routing server recognizes that the destination number is a Public Switched Telephone Network (PSTN) phone and routes the call through the traditional Public Switched Telephone Network.

Learn more about the basics with our VoIP Security Guide.

VoIP security threats quiz
As VoIP becomes increasingly prevalent, so do the threats aimed at subverting its security. After all, letters IP in VoIP stand for Internet Protocol and that means attackers have a ready-made bag of tricks to pick from. How much do you know about the threats to VoIP security? Take our quiz to find out.

 Comment on this Post

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: