in Education by
In which of the following cases Session Initiation Protocol is not used? (a) Instant Messaging (b) Voice over LTE (VoLTE) (c) Internet telephony (d) Data Transferring I have been asked this question in examination. I need to ask this question from Security Protocols in section Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
The correct choice is (d) Data Transferring Explanation: Session Initiation Protocol is used as real-time session maintaining and is used voice, video as well as messaging applications for controlling multimedia communication sessions.

Related questions

0 votes
    Which of the protocol is not used in the network layer of the TCP/IP model? (a) ICMP (b) IP (c) IGMP ... bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a strong security protocol? (a) HTTPS (b) SSL (c) SMTP (d) SFTP I had been ... , Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Which of the following is not session layer vulnerability? (a) Mishandling of undefined, poorly defined (b) Spoofing and ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following example do not comes under network level session hijacking. (a) TCP/IP Hijacking (b ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Which of the below-mentioned protocol is not susceptible to sniffing? (a) HTTP (b) SMTP (c) POP (d) ... ?,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Which of the below-mentioned protocol is not susceptible to sniffing? (a) NNTP (b) UDP (c) FTP (d) ... ?,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Which of them is not a session hijacking tool? (a) Juggernaut (b) IP watcher (c) Wireshark (d) Paros ... ,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
0 votes
    The logical port is associated with the type of protocol used along with the IP address of the host. (a) True ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    The most commonly used session hijacking attack is the _______________ (a) IP hacking (b) IP spooling (c) ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    What types of data are stolen by cyber-criminals in most of the cases? (a) Data that will pay once sold (b ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of session layer vulnerability? (a) weak or non-existent mechanisms for ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is a session hijacking tool? (a) T-Sight (b) Wireshark (c) Maltego (d) Nessus ... ,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    In which year computer scientists try to integrate encryption techniques in TCP/IP protocol? (a) 1978 (b) 1980 (c ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
...