Lpi 020-100 Security Essentials – Exam 020, version 1.0 Online Training
Lpi 020-100 Online Training
The questions for 020-100 were last updated at Mar 02,2025.
- Exam Code: 020-100
- Exam Name: Security Essentials - Exam 020, version 1.0
- Certification Provider: Lpi
- Latest update: Mar 02,2025
What is blockchain?
- A . Blockchain is a digital currency.
- B . Blockchain is a type of database management system
- C . Blockchain is a proprietary software platform developed by a single company.
- D . A type of database that uses a network of nodes to store information in a decentralized manner
Which of the following is a fraudulent activity designed to deceive individuals into providing sensitive information or transferring funds to unauthorized parties in the context of IT security?
- A . Intrusion detection system
- B . Data encryption
- C . Firewall
- D . Scamming
What is the purpose of an RFID tag?
- A . To enable wireless communication between devices
- B . To store and transfer data wirelessly
- C . To connect devices to the internet
- D . To control network traffic
Which type of asymmetric encryption algorithm provides better security than an equivalent RSA key of the same size and is commonly used in mobile devices?
- A . RSA
- B . Diffie-Hellman
- C . ECC
- D . IDEA
Which of the following is a technology used for sending and receiving encrypted emails in Mozilla Thunderbird?
- A . SMTP
- B . OpenPGP and S/MIME
- C . POP3
- D . IMAP
What is the most effective type of phishing for targeting key executives within an organization?
- A . Spearphishing
- B . Whaling
- C . Vishing
- D . Smishing
You are tasked with securely storing backups of sensitive data in a cloud service.
Which security measure should you implement to help ensure data privacy?
- A . Physical security measures for the cloud server
- B . Encryption of backups before uploading to the cloud service
- C . Two-factor authentication for accessing backups
- D . Password-protected backups
Which of the following is a type of attack where an attacker intercepts and reads network traffic?
- A . Botnet
- B . Traffic interception
- C . DoS
- D . Packet filter
Which of the following pertains to the possible damage resulting from mistakes and service disruptions?
- A . Cost Reduction
- B . Operational Risks
- C . Increased Productivity
- D . System Errors
Which of the following risk management strategies seeks to minimize risk to an acceptable level?
- A . Risk avoidance
- B . Risk transfer
- C . Risk mitigation
- D . Risk acceptance