Exam CAS-004 All QuestionsBrowse all questions from this exam
Question 431

Which of the following should be established when configuring a mobile device to protect user internet privacy, to ensure the connection is encrypted, and to keep user activity hidden? (Choose two.)

    Correct Answer: A, B

    To protect user internet privacy, ensure the connection is encrypted, and keep user activity hidden, a proxy and tunneling are essential. A proxy server intermediates between the user's device and the internet, masking the user’s IP address and potentially encrypting data in transit, thereby providing privacy. Tunneling, typically implemented via a VPN, establishes a secure and encrypted connection between the device and a remote server, protecting user data from external threats and hiding activity from third parties.

Discussion
ChopSNapOptions: AB

The two best options for protecting user internet privacy, ensuring encrypted connections, and keeping user activity hidden are: A. Proxy Reason: A proxy server can help anonymize user activity by routing requests through an intermediary server, thus providing a layer of privacy and often encrypting data in transit. B. Tunneling Reason: Tunneling protocols (such as VPN) create secure, encrypted connections between the device and a remote server, ensuring that user data is protected and hidden from external observers.