Which technology can be used to protect voip against eavesdropping


Asked by admin @ in Computer Science viewed by 359 People


Which technology can be used to protect voip against eavesdropping??

Answered by admin @



Answer:

VOIP is carried over a transport layer protocol. Any encrypted transport layer protocol thus will encrypt a VOIP call. Of course, both ends of the call must agree on the encryption to be used.


Similar Questions

Technology used to distribute service requests to resources

Asked by admin @ in Computer Science viewed by 352 persons

The technology used to distribute service requests to resources is referred to as

Uses of science and technology in our daily life

Asked by admin @ in English viewed by 484 persons

Article on importance of science and technology in our daily life

Technology must use to feed the forces of change

Asked by admin @ in English viewed by 351 persons

Technology must use to feed the forces of change. A.must be used to feed B.must have been using to feed C.must use having fed D.must be using to feed

What is an advantage of using blockchain technology brainly

Asked by admin @ in English viewed by 537 persons

What is an advantage of using blockchain technology?

Which technology is used in first generation of computer

Asked by admin @ in Computer Science viewed by 335 persons

Which technology was used in the first generation of computers?

Mechanisms are used to protect data from indirect detections

Asked by admin @ in Computer Science viewed by 563 persons

Which of the following is a mechanism of providing protection to data and methods of a program?​

Which technology was used in first generation of computer

Asked by admin @ in Computer Science viewed by 343 persons

Which technology was used in the first generation of computers?

Which technology can be used to ensure data confidentiality

Asked by admin @ in Computer Science viewed by 348 persons

Which technology can be used to ensure data confidentiality?

How does use of fuse wire protect electrical appliances

Asked by admin @ in Physics viewed by 316 persons

6. How does use of fuse wire protect electrical appliances?

What technology do search engines use to crawl websites

Asked by admin @ in Computer Science viewed by 561 persons

What technology do search engines use to 'crawl' websites?

Why did dna technology lead to more use of cladistics

Asked by admin @ in Biology viewed by 407 persons

Why did dna technology lead to more use of cladistics

Which connection technology uses what is known as a cmts

Asked by admin @ in Computer Science viewed by 314 persons

Which connection technology uses what is known as a CMTS?

How can the use of new technology in industry benefit

Asked by maham237 @ in Social Studies viewed by 307 persons

Workers can react to economic change quickly. Workers can identify economic emergencies. Workers can gain new knowledge and skills. Workers can make economic forecasts.

How does the use of cell technology benefit public health

Asked by maham237 @ in Biology viewed by 316 persons

It makes it possible to discover new anticancer drugs. It makes it possible to culture fewer types of cells. It makes it possible to regulate medical research. It makes it …

How could technology be best used to solve this problem

Asked by maham237 @ in Biology viewed by 348 persons

This waste is usually burned, which can release chemicals like lead into the air.How could technology be best used to solve this problem? A. Reduce the number of medical procedures …

Most viewed questions in Computer Science


A programmer mistakenly writes gor instead of for

Asked by admin @ in Computer Science viewed by 19029 persons


Domestic data entry operator ncert book class 9 solutions

Asked by admin @ in Computer Science viewed by 15815 persons


Information technology code 402 class 9 solutions chapter 1

Asked by admin @ in Computer Science viewed by 10977 persons



Ncert solutions for class 8 computer chapter 1 computer system

Asked by admin @ in Computer Science viewed by 10407 persons


A scrum team works on a 4 weeks sprint

Asked by admin @ in Computer Science viewed by 8723 persons


Which of the following occupies more memory in c

Asked by admin @ in Computer Science viewed by 8142 persons



A database of motor vehicles has the base entity

Asked by admin @ in Computer Science viewed by 7845 persons


The network architecture can be termed as a mcq

Asked by admin @ in Computer Science viewed by 6492 persons


Cat5 and cat6 cabling refer to which reference model layer

Asked by admin @ in Computer Science viewed by 5795 persons



Class 7 computer chapter 3 questions and answers

Asked by admin @ in Computer Science viewed by 5696 persons


Choose the correct options about usability and user experience

Asked by admin @ in Computer Science viewed by 5479 persons


Which advocates daily team meetings for coordination and integration

Asked by admin @ in Computer Science viewed by 4985 persons



Which three security features match the database security level

Asked by admin @ in Computer Science viewed by 4976 persons


Which of the dbms package is not available

Asked by admin @ in Computer Science viewed by 4688 persons


________ aid a business grow and attain its objectives

Asked by admin @ in Computer Science viewed by 4492 persons