Choose The Correct Answer To Each Question
1. Which implementation of Voice over Internet Protocol (VoIP) can be used for a secure voice solution?
Secure Voice over IP SVoIP
Voice over Secure IP VosIP
Both
Not quite. The correct answer is C, both. High assurance secure voice solutions that can operate on any (secure or unsecure) VoIP network are referred to as SVoIP solutions. Additionally, there are commercial voice solutions that operate over a Secure IP network, referred to as VoSIP solutions.
Not quite. The correct answer is C, both. High assurance secure voice solutions that can operate on any (secure or unsecure) VoIP network are referred to as SVoIP solutions. Additionally, there are commercial voice solutions that operate over a Secure IP network, referred to as VoSIP solutions.
Correct!
High assurance secure voice solutions that can operate on any (secure or unsecure) VoIP network are referred to as SVoIP solutions. Additionally, there are commercial voice solutions that operate over a Secure IP network, referred to as VoSIP solutions.
2. True or False: SVoIP and VoSIP offer the same user benefits.
True
False
That’s not right.
While both SVoIP and VoSIP infrastructures are used to securely transmit voice and data communications over IP networks, they differ greatly in security, flexibility, usability and interoperability.
You got it!
While both SVoIP and VoSIP infrastructures are used to securely transmit voice and data communications over IP networks, they differ greatly in security, flexibility, usability and interoperability.
3. True or False: An SVoIP infrastructure provides end-to-end security.
True
False
Correct!
Encryption in an SVoIP solution is embedded into the end user device, protecting data at all times. Conversely, in VoSIP infrastructures, encryption occurs at the network level, exposing data between the network and the end user device.
Not quite.
Encryption in an SVoIP solution is embedded into the end user device, protecting data at all times. Conversely, in VoSIP infrastructures, encryption occurs at the network level, exposing data between the network and the end user device.
4. True or False: VoSIP implementations do not provide the flexibility to support communications between different networks and security levels.
True
False
Yes!.
In a VoSIP infrastructure, where a commercial phone is connected to a secure network, all communications are limited to the security level of the network and communication is limited to devices connected on that closed, secure network. SVoIP solutions are network agnostic and can be used to communicate over multiple (secure of unsecure) networks and secure calls classified TS and Below, making SVoIP infrastructures more flexible than VoSIP infrastructures.
Not exactly.
In a VoSIP infrastructure, where a commercial phone is connected to a secure network, all communications are limited to the security level of the network and communication is limited to devices connected on that closed, secure network. SVoIP solutions are network agnostic and can be used to communicate over multiple (secure of unsecure) networks and secure calls classified TS and Below, making SVoIP infrastructures more flexible than VoSIP infrastructures.
5. True or False: SVoIP and VoSIP infrastructures are managed in the same way.
True
False
Nice try.
In SVoIP solutions, the end user device can be managed within any network (e.g. using GEM® One Software). Conversely in VoSIP solutions, the end user device can only be managed within the red (secure) network.
Exactly!
In SVoIP solutions, the end user device can be managed within any network (e.g. using GEM® One Software). Conversely in VoSIP solutions, the end user device can only be managed within the red (secure) network.
6. True or False: SVoIP secure voice architectures are typically less complex than VoSIP when it comes to networking equipment and quantity of phones needed to address mission needs.
True
False
You got it.
VoSIP architectures are highly complex, with typical implementations requiring additional, independent phones and networks for classified and unclassified communications. SVoIP architectures are much simpler by comparison, requiring only one single desktop phone for both secure and non-secure calls, eliminating the need for multiple phones and network equipment.
Nice try.
VoSIP architectures are highly complex, with typical implementations requiring additional, independent phones and networks for classified and unclassified communications. SVoIP architectures are much simpler by comparison, requiring only one single desktop phone for both secure and non-secure calls, eliminating the need for multiple phones and network equipment.
7. True or False: Government-approved secure phones used for SVoIP implementations must be SCIP complaint.
True
False
Right!
Secure Communication Interoperability Protocol (SCIP) is an application layer encryption protocol developed by NSA to ensure users can send and receive voice and data communications securely from end-to-end, regardless of device manufacturer. Government-approved secure phones used for SVoIP implementations must be SCIP compliant. Commercials IP phones are not SCIP compliant and therefore cannot securely interoperate with SCIP-compliant devices.
Nice try.
Secure Communication Interoperability Protocol (SCIP) is an application layer encryption protocol developed by NSA to ensure users can send and receive voice and data communications securely from end-to-end, regardless of device manufacturer. Government-approved secure phones used for SVoIP implementations must be SCIP compliant. Commercials IP phones are not SCIP compliant and therefore cannot securely interoperate with SCIP-compliant devices.
8. True or False: A government secure VoIP phone can be used on a VoSIP network.
True
False
Exactly!
A government approved SVoIP phone enables TS/SCI communications over a network secured at lower levels (secret or SBU) because of end-to-end embedded encryption. This is ideal for applications that have a need for Top Secret protection or operate in high risk environments which require the need for end-to-end encryption.
Not quite.
A government approved SVoIP phone enables TS/SCI communications over a network secured at lower levels (secret or SBU) because of end-to-end embedded encryption. This is ideal for applications that have a need for Top Secret protection or operate in high risk environments which require the need for end-to-end encryption.
9. True or False: With an SVoIP phone like the Sectéra® vIPer Secure Phone you can eliminate the need for multiple desktop phones.
True
False
Correct!
The Sectéra® vIPer™ Universal Secure Phone is an NSA certified, SCIP compliant secure voice solution designed to support both SVoIP and VoSIP network designs as well as legacy PSTN/analog voice systems. Since the security is built directly into the phone itself, the vIPer can provide enhanced security beyond a VoSIP network’s classification. If on a Secret VoSIP network, the Sectéra vIPer phone enables users to enhance the security level to transmit voice and data classified up to TS/SCI. Similarly, if the vIPer resides on an unclassified SVoIP network, the user still has the ability to make secure calls up to the TS/SCI level, but can also make unsecured, clear calls. This demonstrates the flexibility vIPer provides, enabling users to eliminate multiple desktop phones and use the Sectéra vIPer Universal Secure Phone for all their voice needs.
Not quite.
The Sectéra® vIPer™ Universal Secure Phone is an NSA certified, SCIP compliant secure voice solution designed to support both SVoIP and VoSIP network designs as well as legacy PSTN/analog voice systems. Since the security is built directly into the phone itself, the vIPer can provide enhanced security beyond a VoSIP network’s classification. If on a Secret VoSIP network, the Sectéra vIPer phone enables users to enhance the security level to transmit voice and data classified up to TS/SCI. Similarly, if the vIPer resides on an unclassified SVoIP network, the user still has the ability to make secure calls up to the TS/SCI level, but can also make unsecured, clear calls. This demonstrates the flexibility vIPer provides, enabling users to eliminate multiple desktop phones and use the Sectéra vIPer Universal Secure Phone for all their voice needs.
10. Which architecture enables interoperability beyond a single mission?
VoSIP using traditional Type 1 Network Encryptors
SVoIP using NSAs SCIP protocol
Both
Not quite. The correct answer is B, SVoIP using NSA’s SCIP protocol.
SVoIP using NSA’s SCIP protocol enables products to seamlessly talk between all other SVoIP phones similarly keyed. In addition, products like the Sectéra vIPer Universal Secure Phone enables the consolidation of missions on a single phone.
You got it!
SVoIP using NSA’s SCIP protocol enables products to seamlessly talk between all other SVoIP phones similarly keyed. In addition, products like the Sectéra vIPer Universal Secure Phone enables the consolidation of missions on a single phone.
Not quite. The correct answer is B, SVoIP using NSA’s SCIP protocol.
SVoIP using NSA’s SCIP protocol enables products to seamlessly talk between all other SVoIP phones similarly keyed. In addition, products like the Sectéra vIPer Universal Secure Phone enables the consolidation of missions on a single phone.