<< Prev Question

Question 14/14

A security analyst wants to harden the company's VoIP PBX. The
analyst is worried that credentials may be intercepted and
compromised when IP phones authenticate with the BPX. Which of the
following would best prevent this from occurring?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *