Which of the following should be established when configuring a mobile device to protect user internet privacy, to ensure the connection is encrypted, and to keep user activity hidden? (Choose two.)
Which of the following should be established when configuring a mobile device to protect user internet privacy, to ensure the connection is encrypted, and to keep user activity hidden? (Choose two.)
To protect user internet privacy, ensure the connection is encrypted, and keep user activity hidden on a mobile device, you should establish a proxy and tunneling. A proxy server can hide a user's IP address and route internet traffic through a different server, masking the user's identity and location. Tunneling, particularly using a Virtual Private Network (VPN), encrypts the user's internet traffic and routes it through a secure server, ensuring the connection is encrypted and user's activity is hidden from potential eavesdroppers.
How can anyone vote BF? The requirements are simple: 1. Protect user internet activity - can be achieved by VPN tunneling. 2. Ensure connection is encrypted - that's exactly what tunneling does. 3. KEEP USER ACTIVITY HIDDEN - we all use forward proxies for this very reason. Public VPN providers do exactly these two things - tunneling + proxying. Since when does MAC Randomization "keep user activity hidden?" - it only randomizes the device's MAC address and contributes to anonymity, but it doesn't "hide" the user activity. This is something encryption does!
You tell 'em, Potato42
BF seems best. Proxy can't encrypt your data so the tunneling (VPN) to encrypt your data and hide internet activity, and the MAC address randomization to further conceal your activity connecting to wireless access points.
bro Mac is a layer 2 address that already gets changed when traveling from router to router
The correct answers are A. Proxy and B. Tunneling.
B. Tunneling: Tunneling involves creating a secure, encrypted connection (tunnel) between the mobile device and a trusted server or network. It helps protect data in transit from eavesdropping and ensures privacy. Virtual Private Networks (VPNs) are a common way to achieve tunneling for mobile devices. F. MAC address randomization: MAC address randomization is a technique used to prevent tracking of a device based on its physical MAC address. This helps enhance user privacy by making it more difficult for third parties to identify and track the device.
AB seems logically correct.
BF is the best choice, mac Address randomization end at layer two, it will only lead to identical mac address in the CAM table creating chaus to the switch
To protect user internet privacy, ensure encrypted connections, and hide user activity on a mobile device, you should consider implementing the following: B. Tunneling: This involves using a VPN (Virtual Private Network) to create a secure, encrypted tunnel for internet traffic, which helps protect user privacy and encrypts data in transit. F. MAC address randomization: This is a technique where a mobile device changes its MAC address regularly, making it harder for third parties to track or identify the device based on its MAC address. It enhances user privacy.
A. Proxy Reason: A proxy server can help hide a user's IP address and route internet traffic through a different server, masking the user's identity and location. It adds a layer of privacy by preventing direct connections between the user's device and the internet services they access. B. Tunneling (specifically using a VPN) Reason: Tunneling, particularly using a Virtual Private Network (VPN), encrypts the user's internet traffic and routes it through a secure server. This ensures that the connection is encrypted, protecting data from interception by third parties. It also hides the user's activity from ISPs and other potential eavesdroppers.
MAC does not keep user activity hidden. Going with A and B
MAC is only important in LAN. should not be selected as a choice