Tech Quiz of the Day

Sep 30 2009   1:30PM GMT

VoIP security quiz

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

“The major threats a company faces in using VoIP is that, when improperly implemented, eavesdropping is pretty easy.”

Randy Abrams, Threats On The Move

How does VoIP work?

When you call a number, a VoIP adapter logs on to a  routing server.  The VoIP adaptor is provided by your VoIP service provider.  It might be a software program, a phone jack that plugs into your computer or a dedicated VoIP phone.

The routing server looks up the IP number that’s associated with the destination phone number and makes the connection.  If the destination number isn’t using VoIP, the routing server recognizes that the destination number is a Public Switched Telephone Network (PSTN) phone and routes the call through the traditional Public Switched Telephone Network.

Learn more about the basics with our VoIP Security Guide.

VoIP security threats quiz
As VoIP becomes increasingly prevalent, so do the threats aimed at subverting its security. After all, letters IP in VoIP stand for Internet Protocol and that means attackers have a ready-made bag of tricks to pick from. How much do you know about the threats to VoIP security? Take our quiz to find out.

 Comment on this Post

There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

Share this item with your network: