Which technology can be used to protect voip against eavesdropping


Asked by admin @ in Computer Science viewed by 348 People


Which technology can be used to protect voip against eavesdropping??

Answered by admin @



Answer:

VOIP is carried over a transport layer protocol. Any encrypted transport layer protocol thus will encrypt a VOIP call. Of course, both ends of the call must agree on the encryption to be used.


Similar Questions

Technology used to distribute service requests to resources

Asked by admin @ in Computer Science viewed by 344 persons

The technology used to distribute service requests to resources is referred to as

Uses of science and technology in our daily life

Asked by admin @ in English viewed by 474 persons

Article on importance of science and technology in our daily life

Technology must use to feed the forces of change

Asked by admin @ in English viewed by 343 persons

Technology must use to feed the forces of change. A.must be used to feed B.must have been using to feed C.must use having fed D.must be using to feed

What is an advantage of using blockchain technology brainly

Asked by admin @ in English viewed by 528 persons

What is an advantage of using blockchain technology?

Which technology is used in first generation of computer

Asked by admin @ in Computer Science viewed by 326 persons

Which technology was used in the first generation of computers?

Mechanisms are used to protect data from indirect detections

Asked by admin @ in Computer Science viewed by 555 persons

Which of the following is a mechanism of providing protection to data and methods of a program?​

Which technology was used in first generation of computer

Asked by admin @ in Computer Science viewed by 329 persons

Which technology was used in the first generation of computers?

Which technology can be used to ensure data confidentiality

Asked by admin @ in Computer Science viewed by 339 persons

Which technology can be used to ensure data confidentiality?

How does use of fuse wire protect electrical appliances

Asked by admin @ in Physics viewed by 311 persons

6. How does use of fuse wire protect electrical appliances?

What technology do search engines use to crawl websites

Asked by admin @ in Computer Science viewed by 549 persons

What technology do search engines use to 'crawl' websites?

Why did dna technology lead to more use of cladistics

Asked by admin @ in Biology viewed by 396 persons

Why did dna technology lead to more use of cladistics

Which connection technology uses what is known as a cmts

Asked by admin @ in Computer Science viewed by 306 persons

Which connection technology uses what is known as a CMTS?

How can the use of new technology in industry benefit

Asked by maham237 @ in Social Studies viewed by 298 persons

Workers can react to economic change quickly. Workers can identify economic emergencies. Workers can gain new knowledge and skills. Workers can make economic forecasts.

How does the use of cell technology benefit public health

Asked by maham237 @ in Biology viewed by 311 persons

It makes it possible to discover new anticancer drugs. It makes it possible to culture fewer types of cells. It makes it possible to regulate medical research. It makes it …

How could technology be best used to solve this problem

Asked by maham237 @ in Biology viewed by 339 persons

This waste is usually burned, which can release chemicals like lead into the air.How could technology be best used to solve this problem? A. Reduce the number of medical procedures …

Most viewed questions in Computer Science


A programmer mistakenly writes gor instead of for

Asked by admin @ in Computer Science viewed by 19012 persons


Domestic data entry operator ncert book class 9 solutions

Asked by admin @ in Computer Science viewed by 15786 persons


Information technology code 402 class 9 solutions chapter 1

Asked by admin @ in Computer Science viewed by 10957 persons



Ncert solutions for class 8 computer chapter 1 computer system

Asked by admin @ in Computer Science viewed by 10392 persons


A scrum team works on a 4 weeks sprint

Asked by admin @ in Computer Science viewed by 8715 persons


Which of the following occupies more memory in c

Asked by admin @ in Computer Science viewed by 8124 persons



A database of motor vehicles has the base entity

Asked by admin @ in Computer Science viewed by 7833 persons


The network architecture can be termed as a mcq

Asked by admin @ in Computer Science viewed by 6475 persons


Cat5 and cat6 cabling refer to which reference model layer

Asked by admin @ in Computer Science viewed by 5781 persons



Class 7 computer chapter 3 questions and answers

Asked by admin @ in Computer Science viewed by 5680 persons


Choose the correct options about usability and user experience

Asked by admin @ in Computer Science viewed by 5467 persons


Which advocates daily team meetings for coordination and integration

Asked by admin @ in Computer Science viewed by 4973 persons



Which three security features match the database security level

Asked by admin @ in Computer Science viewed by 4963 persons


Which of the dbms package is not available

Asked by admin @ in Computer Science viewed by 4677 persons


________ aid a business grow and attain its objectives

Asked by admin @ in Computer Science viewed by 4480 persons