Categories
Computer Science

In order to complete assignment #7 you will need to answer the below questions.

Swamped with your writing assignments? Take the weight off your shoulder!

Submit your assignment instructions

In order to complete assignment #7 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading, also please paste your answers in the text box. When assigning a name to your document please use the following format (last name_Assignment #). Use examples from the readings, lecture notes and outside research to support your answers. All questions must answered with viable support and detail. Your answer cannot simply be a cited source answering the question. Please be sure to follow APA guidelines for citing and referencing source. This assignment is a summative assessment for Course Objective 3. 1. List at least five security threats specific to VoIP. Give a brief description and possible scenario. 2. List at least 10 Vulnerabilities in VoIP. Briefly describe each of the listed vulnerability, along with a possible recommendation for a countermeasure. 3. Explain the end-to-end process of how VoIP works. 4. Go back to problem 3 and list possible vulnerabilities in each step of the process. 5. In problem 4 list what would be most risky vulnerability, with the most possible damage 6. In problem 5 – list how you would create a plan to mitigate possible damages and have services running smoothly and securely. Assignment Rubric (100 Points) Synthesis of Concepts 60 Writing Standards – APA format 20 Timeliness 20

Swamped with your writing assignments? Take the weight off your shoulder!

Submit your assignment instructions

Leave a Reply