The security administrator is worried about possible SPIT attacks against the VoIP system.
Which of the following security controls would MOST likely need to be implemented to detect this
type of attack?
A.
SIP and SRTP traffic analysis
B.
QoS audit on Layer 3 devices
C.
IP and MAC filtering logs
D.
Email spam filter log