List of questions
Related questions
Question 338 - CAS-004 discussion
Which of the following should be established when configuring a mobile device to protect user internet privacy, to ensure the connection is encrypted, and to keep user activity hidden? (Select TWO).
A.
proxy
B.
Tunneling
C.
VDI
D.
MDM
E.
RDP
F.
MAC address randomization
Your answer:
0 comments
Sorted by
Leave a comment first