This tip is part of SearchSecurity.com's Integration of Networking and Security School lesson, Securing the converged infrastructure. Visit the lesson page for more learning resources.
If you answered two or more questions incorrectly, revisit the materials from the lesson, Securing the converged infrastructure:
Webcast: Security for unified communications and messaging
Tip: Unified communications infrastructure threats and defense strategies
Podcast: Fact or fiction: How to layer security within your messaging architecture
If you answered four or more questions correctly, return to SearchSecurity.com's Integration of Networking and Security School and begin another lesson, or try another school in SearchSecurity.com's Security School Course Catalog.
Dig deeper on Network Device Management