Sales team members have been receiving threatening voicemail messages and have reported these incidents to the IT security team. Which of the following would be MOST appropriate for the IT security team to analyze?
Since the threatening messages are reported to be voicemail messages, analyzing the Session Initiation Protocol (SIP) traffic logs would be the most appropriate action. SIP is a signaling protocol commonly used for initiating, maintaining, modifying, and terminating real-time communication sessions like voice and video calls over IP networks. Voicemail messages often involve SIP traffic, which includes information about the call setup and signaling details.
Analyzing SIP traffic logs can help the IT security team identify the source of the threatening voicemail messages, track the call flow, and gather information about the calling party. This can be crucial for understanding the nature of the threat and taking appropriate actions to mitigate or prevent further incidents.
Session Initiation Protocol traffic logs: SIP traffic logs are relevant because they can provide information about the call sessions, including details about the originating and receiving parties, timestamps, call duration, and potentially the content of the SIP messages. Analyzing SIP traffic logs can help identify the source of the threatening voicemail messages and the related call sessions.
upvoted 2 times
...
This section is not available anymore. Please use the main Exam Page.SY0-601 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
ApplebeesWaiter1122
Highly Voted 1 year, 11 months agoBenrosan
Most Recent 1 year, 5 months agotouisuzuki
1 year, 9 months ago