exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 296 discussion

Actual exam question from CompTIA's CAS-004
Question #: 296
Topic #: 1
[All CAS-004 Questions]

Which of the following should be established when configuring a mobile device to protect user internet privacy, to ensure the connection is encrypted, and to keep user activity hidden? (Choose two.)

  • A. Proxy
  • B. Tunneling
  • C. VDI
  • D. MDM
  • E. RDP
  • F. MAC address randomization
Show Suggested Answer Hide Answer
Suggested Answer: AB 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Potato42
Highly Voted 1 year, 4 months ago
Selected Answer: AB
How can anyone vote BF? The requirements are simple: 1. Protect user internet activity - can be achieved by VPN tunneling. 2. Ensure connection is encrypted - that's exactly what tunneling does. 3. KEEP USER ACTIVITY HIDDEN - we all use forward proxies for this very reason. Public VPN providers do exactly these two things - tunneling + proxying. Since when does MAC Randomization "keep user activity hidden?" - it only randomizes the device's MAC address and contributes to anonymity, but it doesn't "hide" the user activity. This is something encryption does!
upvoted 10 times
e020fdc
1 year, 2 months ago
You tell 'em, Potato42
upvoted 4 times
...
...
ThatGuyOverThere
Highly Voted 1 year, 6 months ago
Selected Answer: BF
BF seems best. Proxy can't encrypt your data so the tunneling (VPN) to encrypt your data and hide internet activity, and the MAC address randomization to further conceal your activity connecting to wireless access points.
upvoted 7 times
23d5d21
5 months, 2 weeks ago
F. MAC Address Randomization Privacy Aspect: This feature randomizes your device's MAC address when connecting to Wi-Fi networks, preventing tracking based on hardware addresses. Limitation: It does not encrypt your internet connection or hide your online activities beyond local network tracking.
upvoted 1 times
...
hisamdavid
9 months, 3 weeks ago
bro Mac is a layer 2 address that already gets changed when traveling from router to router
upvoted 1 times
...
...
Bright07
Most Recent 5 months ago
Selected Answer: BF
B. Tunneling: Tunneling refers to the process of using a secure, encrypted connection (often via a VPN) to route all network traffic through a secure channel. This ensures that the data transmitted between the mobile device and the destination server is encrypted, protecting it from potential interception and eavesdropping. F. MAC address randomization is a technique used to improve privacy on mobile devices, particularly when connecting to Wi-Fi networks. By periodically changing the Media Access Control (MAC) address, a device can avoid being tracked by its unique identifier, preventing third parties from monitoring user activity based on static MAC addresses. NOT Proxy, While a proxy can provide some privacy benefits by routing traffic through an intermediary server, it doesn’t necessarily guarantee encryption or protect against all forms of tracking and eavesdropping. Tunneling (via VPN) is more commonly used for secure, encrypted connections.
upvoted 2 times
...
Bright07
8 months, 1 week ago
B. MAC address randomization involves periodically changing the Media Access Control (MAC) address of the device to prevent tracking by network observers. By randomizing the MAC address, it becomes harder for third parties to track the device’s location and usage patterns based on a static MAC address. F. MAC address randomization involves periodically changing the Media Access Control (MAC) address of the device to prevent tracking by network observers. By randomizing the MAC address, it becomes harder for third parties to track the device’s location and usage patterns based on a static MAC address. Not A. PROXY because Proxy servers can help with privacy and anonymity by routing internet traffic through a different server, but they do not inherently encrypt connections unless used in conjunction with other technologies like HTTPS. While proxies can help obscure user activity, they are not as robust as VPNs in providing encryption and privacy.
upvoted 1 times
...
23169fd
9 months, 3 weeks ago
Selected Answer: AB
A. Proxy Reason: A proxy server can help hide a user's IP address and route internet traffic through a different server, masking the user's identity and location. It adds a layer of privacy by preventing direct connections between the user's device and the internet services they access. B. Tunneling (specifically using a VPN) Reason: Tunneling, particularly using a Virtual Private Network (VPN), encrypts the user's internet traffic and routes it through a secure server. This ensures that the connection is encrypted, protecting data from interception by third parties. It also hides the user's activity from ISPs and other potential eavesdroppers.
upvoted 2 times
...
6809276
1 year, 1 month ago
Selected Answer: AB
MAC does not keep user activity hidden. Going with A and B
upvoted 2 times
...
nuel_12
1 year, 5 months ago
Selected Answer: BF
BF is the best choice, mac Address randomization end at layer two, it will only lead to identical mac address in the CAM table creating chaus to the switch
upvoted 3 times
...
Ariel235788
1 year, 7 months ago
Selected Answer: BF
To protect user internet privacy, ensure encrypted connections, and hide user activity on a mobile device, you should consider implementing the following: B. Tunneling: This involves using a VPN (Virtual Private Network) to create a secure, encrypted tunnel for internet traffic, which helps protect user privacy and encrypts data in transit. F. MAC address randomization: This is a technique where a mobile device changes its MAC address regularly, making it harder for third parties to track or identify the device based on its MAC address. It enhances user privacy.
upvoted 3 times
...
CoinUmbrella
1 year, 7 months ago
Selected Answer: BF
B. Tunneling: Tunneling involves creating a secure, encrypted connection (tunnel) between the mobile device and a trusted server or network. It helps protect data in transit from eavesdropping and ensures privacy. Virtual Private Networks (VPNs) are a common way to achieve tunneling for mobile devices. F. MAC address randomization: MAC address randomization is a technique used to prevent tracking of a device based on its physical MAC address. This helps enhance user privacy by making it more difficult for third parties to identify and track the device.
upvoted 4 times
...
Nnatech
1 year, 8 months ago
Selected Answer: AB
AB seems logically correct.
upvoted 4 times
...
Uncle_Lucifer
1 year, 8 months ago
MAC is only important in LAN. should not be selected as a choice
upvoted 2 times
...
Alizadeh
1 year, 8 months ago
Selected Answer: AB
The correct answers are A. Proxy and B. Tunneling.
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago