I'm a bit confused on this one. Is a collision attack also a possibility with weak passwords? I'm not totally sure about the differences between these types of attacks.
Hmm, this seems like a tricky one. I'll need to think through the high availability setup and the specific behavior of the Session Border Controller nodes.
upvoted 0
times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Paola
6 months agoRory
6 months agoKaran
6 months agoVernell
6 months agoPhuong
7 months agoLuisa
7 months agoLouisa
7 months agoFreeman
7 months agoKimberely
7 months agoCecil
7 months agoKrissy
7 months ago