CAS-004 Exam QuestionsBrowse all questions from this exam

CAS-004 Exam - Question 296


Which of the following should be established when configuring a mobile device to protect user internet privacy, to ensure the connection is encrypted, and to keep user activity hidden? (Choose two.)

Show Answer
Correct Answer: A,B,F

To protect user internet privacy, ensure the connection is encrypted, and keep user activity hidden on a mobile device, you should establish a proxy and tunneling. A proxy server can hide a user's IP address and route internet traffic through a different server, masking the user's identity and location. Tunneling, particularly using a Virtual Private Network (VPN), encrypts the user's internet traffic and routes it through a secure server, ensuring the connection is encrypted and user's activity is hidden from potential eavesdroppers.

Discussion

10 comments
Sign in to comment
Potato42Options: AB
Dec 18, 2023

How can anyone vote BF? The requirements are simple: 1. Protect user internet activity - can be achieved by VPN tunneling. 2. Ensure connection is encrypted - that's exactly what tunneling does. 3. KEEP USER ACTIVITY HIDDEN - we all use forward proxies for this very reason. Public VPN providers do exactly these two things - tunneling + proxying. Since when does MAC Randomization "keep user activity hidden?" - it only randomizes the device's MAC address and contributes to anonymity, but it doesn't "hide" the user activity. This is something encryption does!

e020fdc
Feb 16, 2024

You tell 'em, Potato42

ThatGuyOverThereOptions: BF
Nov 2, 2023

BF seems best. Proxy can't encrypt your data so the tunneling (VPN) to encrypt your data and hide internet activity, and the MAC address randomization to further conceal your activity connecting to wireless access points.

hisamdavid
Jul 21, 2024

bro Mac is a layer 2 address that already gets changed when traveling from router to router

AlizadehOptions: AB
Aug 29, 2023

The correct answers are A. Proxy and B. Tunneling.

NnatechOptions: AB
Sep 1, 2023

AB seems logically correct.

CoinUmbrellaOptions: BF
Sep 13, 2023

B. Tunneling: Tunneling involves creating a secure, encrypted connection (tunnel) between the mobile device and a trusted server or network. It helps protect data in transit from eavesdropping and ensures privacy. Virtual Private Networks (VPNs) are a common way to achieve tunneling for mobile devices. F. MAC address randomization: MAC address randomization is a technique used to prevent tracking of a device based on its physical MAC address. This helps enhance user privacy by making it more difficult for third parties to identify and track the device.

Ariel235788Options: BF
Oct 4, 2023

To protect user internet privacy, ensure encrypted connections, and hide user activity on a mobile device, you should consider implementing the following: B. Tunneling: This involves using a VPN (Virtual Private Network) to create a secure, encrypted tunnel for internet traffic, which helps protect user privacy and encrypts data in transit. F. MAC address randomization: This is a technique where a mobile device changes its MAC address regularly, making it harder for third parties to track or identify the device based on its MAC address. It enhances user privacy.

nuel_12Options: BF
Nov 16, 2023

BF is the best choice, mac Address randomization end at layer two, it will only lead to identical mac address in the CAM table creating chaus to the switch

Uncle_LuciferOptions: AB
Aug 30, 2023

MAC is only important in LAN. should not be selected as a choice

6809276Options: AB
Mar 15, 2024

MAC does not keep user activity hidden. Going with A and B

23169fdOptions: AB
Jul 15, 2024

A. Proxy Reason: A proxy server can help hide a user's IP address and route internet traffic through a different server, masking the user's identity and location. It adds a layer of privacy by preventing direct connections between the user's device and the internet services they access. B. Tunneling (specifically using a VPN) Reason: Tunneling, particularly using a Virtual Private Network (VPN), encrypts the user's internet traffic and routes it through a secure server. This ensures that the connection is encrypted, protecting data from interception by third parties. It also hides the user's activity from ISPs and other potential eavesdroppers.