Lpi 020-100 Security Essentials – Exam 020, version 1.0 Online Training
Lpi 020-100 Online Training
The questions for 020-100 were last updated at Mar 01,2025.
- Exam Code: 020-100
- Exam Name: Security Essentials - Exam 020, version 1.0
- Certification Provider: Lpi
- Latest update: Mar 01,2025
Which of the following methods can be used to ensure integrity of data during transmission?
- A . Passwords
- B . Encryption
- C . Two-factor authentication
- D . Redundancy
Which of the following backup types is best suited for daily use?
- A . Synthetic backup
- B . Full backup
- C . Incremental backup
- D . Differential backup
Which of the following is a security implication of physical access to a computer?
- A . Unauthorized access to data
- B . Improved processor performance
- C . Decreased memory capacity
- D . Increased network speed
You want to access a website that is blocked in your country.
Which of the following solutions would be the most appropriate for accessing the website?
- A . Network-attached storage
- B . Using an unencrypted public Wi-Fi network
- C . A public VPN provider
- D . Clearing your browser’s cache
You are setting up a Bluetooth connection between your smartphone and a wireless speaker.
What security measure should you take to protect your data?
- A . Use a strong and unique password for the Bluetooth connection
- B . Enable Bluetooth pairing mode on your smartphone
- C . Leave the Bluetooth connection open to all nearby devices
- D . Disable Bluetooth after the connection is established
What is the primary function of an endpoint firewall?
- A . To protect a single device from unauthorized access or attacks
- B . To store data securely
- C . To manage hardware components
- D . To improve network performance
What is the darknet?
- A . A type of network that is used for illegal activities
- B . A type of network that is only accessible through TOR
- C . A type of network that is not connected to the internet
- D . Cloud Storage
Which of the following legal concepts is concerned with compensating someone for harm caused by a security breach?
- A . Public law
- B . Copyright law
- C . Financial compensation claims
- D . Liability
What is the purpose of the GDPR?
- A . To encourage the collection and sharing of personal data without restriction
- B . To encourage the use of insecure data storage methods
- C . The GDPR is a type of virus that infects computer systems and steals personal information
- D . To protect personal information of individuals in the European Union
Which of the following is a type of software that is embedded in hardware devices and provides instructions to the hardware to perform specific tasks?
- A . Desktop applications
- B . Server software
- C . Firmware
- D . Web applications