What risk is mitigated when routing video traffic through a company’s application servers, rather than sending the video traffic directly from one user to another?
A.
The user is protected against phishing attacks.
B.
The user’s identity is protected from the other user.
C.
The user’s approximate physical location is hidden from the other user.
D.
The user is assured that stronger authentication methods have been used.
Option A: Phishing attacks are typically related to email or messaging security rather than direct video traffic.
Option B: While identity protection can be a factor, routing through company servers primarily obfuscates the user's IP address and other metadata, which reveals physical location rather than identity specifics.
Option C: Routing video traffic through a company’s servers hides the users' IP addresses from each other, which prevents them from determining each other's physical location.
Option D: Stronger authentication methods are related to access control but not necessarily to the routing of video traffic.
References:
IAPP CIPT Study Guide
Network security principles related to traffic routing
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit