The "Foundation Summary" section of each chapter lists the most important facts from the chapter. Although this section does not list every fact from the chapter that will be on your CCSP exam, a well-prepared CCSP candidate should, at a minimum, know all the details in each "Foundation Summary" section before going to take the exam.
The SAFE IP telephony design fundamentals are listed here:
Security and attack mitigation based on policy
Quality of service
Reliability, performance, and scalability
Authentication of users and devices (identity)
Options for high availability (some designs)
Secure management
These axioms have been developed for SAFE IP telephony:
Voice networks are targets.
Data and voice segmentation is key.
Telephony devices do not support confidentiality.
IP phones provide access to the data-voice segments.
PC-based IP phones require open access.
PC-based IP phones are especially susceptible to attack.
Controlling the voice-to-data segment interaction is key.
Establishing identity is key.
Rogue devices pose serious threats.
Secure and monitor all voice servers and segments.