Security
This section looks at general security practices followed in the organization. Notes/Comments" section. Include information such as how long it would take to apply a critical hot fix, what testing/certification procedures are followed, etc.
Notes/Comments
Based on the information in Table B-33, you can provide the recommendations, if necessary, to secure the IP telephony infrastructure components.