All questions must answered with viable support and detail.
Your answer cannot simply be a cited source answering the question.
Please be sure to follow APA guidelines for citing and referencing source.
In-text citations for each answer.
1. List at least five security threats specific to VoIP. Give a brief description and possible scenario.
2. List at least 10 Vulnerabilities in VoIP. Briefly describe each of the listed vulnerability, along with a possible recommendation for a countermeasure.
3. Explain the end-to-end process of how VoIP works.
4. Go back to problem 3 and list possible vulnerabilities in each step of the process.
5. In problem 4 list what would be most risky vulnerability, with the most possible damage
6. In problem 5 – list how you would create a plan to mitigate possible damages and have services running smoothly and securely.


Approximately 250 words