Use the questions listed in Notes/Comments" section.
3 Do you require encrypted communication between the Cisco IP Phones?
4 Do you want Cisco IP Phones and other devices to authenticate to the call-processing servers before registration?
5 Do all the applications have antivirus software installed?
By using the information collected in Table C-10, you should be able to design an IPT system that meets the organization's security requirements.