ISSC 641 Central Texas College Softphone and MAC Identity Spoof Attacks Questions

User Generated

QnqqlFunex

Computer Science

ISSC 641

Central Texas College

ISSC

Description

APA guidelines for citing and referencing source.

1. What is a softphone?
2. List four typical active attacks against Wireless Local Area Networks (WLAN). Briefly describe each one.
3. What are some of the security concerns in the Internet Control Management Protocol (ICMP)?
4. Which wireless technology does not operate in the 2.4Ghz frequency range?
a. IEEE 802.11a
b. IEEE 802.11b
c. IEEE 802.11g
d. Bluetooth
5. Routing information is encrypted using which technology:
a. S-ATM (Secure ATM)
b. Link encryption
c. IPSec
d. File Transfer protocol (FTP)
6. List at least five SMS attack types. Could SMS attacks cripple a mobile phone network? Why or why not? Explain.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hello, kindly find the attached completed work. Thank You

Running Head: SOFTPHONE

1

Softphone
Name
Institution of Affiliation
Date

SOFTPHONE

2

Question 1
A softphone refers to an application that strengthens voice over internet protocol (VoIP)
and founds on internet-connected devices. It also helps to call making between two devices. The
apps also referred to as soft clients. The VoIP gives the user the freedom to use the dialing and
all other elements in the form (Ray, Chakravarthy, 2012).
On the other hand, the softphone can find and use all the VoIP features in the phone.
Therefore, most of the phone manufacturers build their softphones for the devices. For every
softphone, the following requirements are necessary; a desktop computer and a VoIP headset
used in making the system. The hea...


Anonymous
Very useful material for studying!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags