Which two methods can be used to challenge the identity of an IP phone from a Cisco Unified CallManager server? (Choose two.)
A.
PKI
B.
TLS
C.
SRTP
D.
digest authentication
E.
HTTPS
F.
SFTP
Which two methods can be used to challenge the identity of an IP phone from a Cisco Unified CallManager server? (Choose two.)
Which two methods can be used to challenge the identity of an IP phone from a Cisco Unified CallManager server? (Choose two.)
A.
PKI
B.
TLS
C.
SRTP
D.
digest authentication
E.
HTTPS
F.
SFTP