Cisco.IP.Telephony.Planning.Design.Implementation.Operation.and.Optimization [Electronic resources]

Tebyan

نسخه متنی -صفحه : 130/ 91
نمايش فراداده

Security

This section looks at general security practices followed in the organization. Notes/Comments" section. Include information such as how long it would take to apply a critical hot fix, what testing/certification procedures are followed, etc.

Yes

No

Notes/Comments

Based on the information in Table B-33, you can provide the recommendations, if necessary, to secure the IP telephony infrastructure components.