Quiz: Securing the converged infrastructure

A five-question multiple-choice quiz to test your understanding of the content presented by expert John Burke in this lesson of SearchSecurity.com's Integration of Networking and Security School.

SearchSecurity.com Security School
This tip is part of SearchSecurity.com's Integration of Networking and Security School lesson, Securing the converged infrastructure. Visit the lesson page for more learning resources.

1. Fill in the blank: An IP desk phone is ____________ .

  1. a less functional device than a TDM phone, but worthwhile since it allows converged networking
  2. a direct, functionally identical replacement for a traditional TDM phone
  3. a more flexibly functional, deeply specialized replacement for a TDM phone
  4. a general purpose computer with a specialized interface that resembles a traditional phone

2. Which phrase best describes SIP and SIMPLE?

  1. They are Layer 5 protocols describing how UC sessions are initiated and controlled.
  2. They are Layer 4 protocols describing the methods used for controlling flow and correcting errors on UC streams.
  3. They are Layer 3 network protocols for describing addressing conventions for UC devices.
  4. They are multi-layer protocols controlling aspects of Layer 3, 4 and 5 behavior.

3. Fill in the blank: Securing a unified communications infrastructure ____________ .

  1. can be accomplished solely with IP phones and the associated call managers
  2. can be managed by adding an appliance or two in the network closet
  3. requires security measures on endpoints, in networks, and on all servers participating in UC sessions
  4. can be managed entirely from the network with a variety of practices and tools

4. Which response represents the best general approach for achieving truly flexible unified communications security in a mobile and virtualized enterprise?

  1. Strong perimeter defenses; other measures are largely unnecessary.
  2. Strong authentication and identity-based security everywhere possible within the infrastructure.
  3. NAC gateways on all LAN and WLAN segments to control who attaches to the network.
  4. IP address management to closely link network addresses to specific devices and users.

5. Which response best describes the role of a real-time communications dashboard?

  1. It displays management and monitoring information about the enterprise UC in place.
  2. It presents a single client interface to all key UC components: audio, video and Web conferencing, presence, telephony and messaging.
  3. It is the interface to the UC elements that require real-time network performance, i.e. all voice and video applications.
  4. It permanently and completely replaces all other communications clients.

If you answered two or more questions incorrectly, revisit the materials from the lesson, Securing the converged infrastructure:

  • Webcast: Security for unified communications and messaging
  • Tip: Unified communications infrastructure threats and defense strategies
  • Podcast: Fact or fiction: How to layer security within your messaging architecture

    If you answered four or more questions correctly, return to SearchSecurity.com's Integration of Networking and Security School and begin another lesson, or try another school in SearchSecurity.com's Security School Course Catalog.

  • This was last published in July 2007

    Dig Deeper on Network device security: Appliances, firewalls and switches

    Start the conversation

    Send me notifications when other members comment.

    Please create a username to comment.