A non-transparent proxy is described as modifying a request or response and the client is made aware of the proxy's existence. Which proxy type matches this description?

Study for the EC-Council Network Defense Essentials Test. Utilize flashcards and multiple-choice questions, with each question accompanied by hints and explanations. Prepare effectively for your examination!

Multiple Choice

A non-transparent proxy is described as modifying a request or response and the client is made aware of the proxy's existence. Which proxy type matches this description?

Explanation:
The key idea is the distinction between explicit (non-transparent) and transparent proxies. An explicit, or non-transparent, proxy is one that the client is configured to use and is aware of. Because the client knows the proxy exists, the intermediary can legitimately modify traffic between the client and the destination—altering requests or responses to enforce policies, implement filtering, or add information. This matches the description where the proxy modifies traffic and the client is aware of its existence. In contrast, a transparent proxy is designed to be invisible to the user; traffic is routed through it without the client’s explicit configuration or awareness, even though it may still perform interception or modification in some setups. The scenario’s emphasis on client awareness points to the explicit, non-transparent proxy rather than the transparent type. Honeypots are security decoys and not proxy types, so they don’t fit the description.

The key idea is the distinction between explicit (non-transparent) and transparent proxies. An explicit, or non-transparent, proxy is one that the client is configured to use and is aware of. Because the client knows the proxy exists, the intermediary can legitimately modify traffic between the client and the destination—altering requests or responses to enforce policies, implement filtering, or add information. This matches the description where the proxy modifies traffic and the client is aware of its existence.

In contrast, a transparent proxy is designed to be invisible to the user; traffic is routed through it without the client’s explicit configuration or awareness, even though it may still perform interception or modification in some setups. The scenario’s emphasis on client awareness points to the explicit, non-transparent proxy rather than the transparent type. Honeypots are security decoys and not proxy types, so they don’t fit the description.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy