- List at least five security threats specific to VoIP. Give a brief description and possible scenario.
- List at least 10 Vulnerabilities in VoIP. Briefly describe each of the listed vulnerability, along with a possible recommendation for a countermeasure.
- Explain the end-to-end process of how VoIP works.
- Go back to problem 3 and list possible vulnerabilities in each step of the process.
- In problem 4 list what would be most risky vulnerability, with the most possible damage
Sample Solution