I'm a bit confused on this one. Is a collision attack also a possibility with weak passwords? I'm not totally sure about the differences between these types of attacks.
Hmm, this seems like a tricky one. I'll need to think through the high availability setup and the specific behavior of the Session Border Controller nodes.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Paola
4 months agoRory
4 months agoKaran
5 months agoVernell
5 months agoPhuong
5 months agoLuisa
5 months agoLouisa
5 months agoFreeman
5 months agoKimberely
5 months agoCecil
5 months agoKrissy
6 months ago