A security administrator is tasked with securing a company’s headquarters and branch offices
move to unified communications. The Chief Information Officer (CIO) wants to integrate the
corporate users’ email, voice mail, telephony, presence and corporate messaging to internal
computers, mobile users, and devices. Which of the following actions would BEST meet the CIO’s
goals while providing maximum unified communications security?
A.
Create presence groups, restrict IM protocols to the internal networks, encrypt remote devices,
and restrict access to services to local network and VPN clients.
B.
Enable discretionary email forwarding restrictions, utilize QoS and Secure RTP, allow external
IM protocols only over TLS, and allow port 2000 incoming to the internal firewall interface for
secure SIP
C.
Set presence to invisible by default, restrict IM to invite only, implement QoS on SIP and RTP
traffic, discretionary email forwarding, and full disk encryption.
D.
Establish presence privacy groups, restrict all IM protocols, allow secure RTP on session
border gateways, enable full disk encryptions, and transport encryption for email security.