1.
Which is true about the PIX Firewall in the remote site firewall option in the SAFE SMR remote user design environment?
2.
The remote site router option is nearly identical to which option?
3.
What protocol is used in call setup to allow the IP telephony conversation to commence?
4.
What port numbers are generally used by calls placed between IP telephony devices?
5.
What is the primary method for device authentication in a VoIP network?
6.
What services does EAP provide?
7.
What are the features of Temporal Key Integrity Protocol (TKIP)?
8.
Wired Equivalent Privacy (WEP) operates at what layer of the OSI model?
9.
Which is a key server found in SAFE Enterprise network design edge corporate Internet module?
10.
Encryption technology can solve the problem of: