ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 338 - CAS-004 discussion

Report
Export

Which of the following should be established when configuring a mobile device to protect user internet privacy, to ensure the connection is encrypted, and to keep user activity hidden? (Select TWO).

A.
proxy
Answers
A.
proxy
B.
Tunneling
Answers
B.
Tunneling
C.
VDI
Answers
C.
VDI
D.
MDM
Answers
D.
MDM
E.
RDP
Answers
E.
RDP
F.
MAC address randomization
Answers
F.
MAC address randomization
Suggested answer: A, F

Explanation:

The methods that can be used to protect user internet privacy, to ensure the connection is encrypted, and to keep user activity hidden are proxy and MAC address randomization. A proxy is a server that acts as an intermediary between a user and the internet, hiding the user's IP address and location from websites and other online services. A proxy can also encrypt the connection between the user and the proxy server, preventing anyone from snooping on the user's traffic. MAC address randomization is a feature that changes the MAC address of a mobile device periodically or when connecting to different networks. A MAC address is a unique identifier of a network interface that can be used to track the device's location and activity. MAC address randomization can help protect the user's privacy by making it harder for third parties to link the device to a specific user or network. Verified

Reference:

https://www.techtarget.com/searchsecurity/definition/proxy-server

https://www.techtarget.com/searchnetworking/definition/MAC-address-randomization

https://www.techtarget.com/searchsecurity/definition/MAC-address-Media-Access-Control-address

asked 02/10/2024
Panayiotis Markatos
51 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first