Security threats that are specific to VoIP.

List at least five security threats specific to VoIP. Give a brief description and a possible scenario. 2. List at least 10 Vulnerabilities in VolP. Briefly describe each of the listed vulnerabilities, along with a possible recommendation for a countermeasure. 3. Explain the end-to-end process of how VolP works. 4. Go back to problem 3 and list possible vulnerabilities in each step of the process 5. In problem 4 lists what would be the riskiest vulnerability, with the most possible damage 6. In problem 5 - list how you would create a plan to mitigate possible damages and have services running smoothly and securely.