Lpi 020-100 Security Essentials – Exam 020, version 1.0 Online Training
Lpi 020-100 Online Training
The questions for 020-100 were last updated at Aug 12,2025.
- Exam Code: 020-100
- Exam Name: Security Essentials - Exam 020, version 1.0
- Certification Provider: Lpi
- Latest update: Aug 12,2025
What is one of the primary factors that determines data retention requirements for backups?
- A . The cost implications of retaining backup data for extended periods
- B . The sensitivity of the data being backed up
- C . The length of time an organization has been in operation
- D . Regulatory requirements and compliance
What is the purpose of a Public Key Infrastructure (PKI)?
- A . To manage private keys
- B . To manage digital certificates and public keys
- C . To manage user accounts
- D . To manage encryption algorithms
Which of the following provides even stronger security through the use of Simultaneous Authentication of Equals (SAE) encryption?
- A . WPA3
- B . WPA2
- C . WEP
- D . WPA
Which of the following is a characteristic of a secure password?
- A . Short length
- B . No special characters
- C . Complexity
- D . Infrequent changes
What are some security risks associated with Smart Devices and IoT networks?
- A . Overheating and battery malfunction
- B . Poor internet connectivity and network lag
- C . Data breaches and unauthorized access
- D . Display and resolution issues
What do web browsers check when verifying the validity of an X.509 certificate?
- A . subjectAltName
- B . Expiration date and issuer
- C . Key usage
- D . Subject
You want to send a private message to a friend using an instant messaging app.
Which of the following solutions would be the most appropriate for ensuring the privacy of your conversation?
- A . TOR
- B . A proxy server
- C . Transfer encryption
- D . End-to-end encryption
What potential issue can arise from using some security tools that mistakenly identify legitimate activities as malicious?
- A . False positives
- B . False negatives
- C . Improved detection accuracy
- D . Reduced system performance impact
Which of the following terms refers to a process of evaluating a system’s security posture?
- A . Security Audit
- B . CVE
- C . Security assessments
- D . ISMS
Which of the following is a fraudulent Wi-Fi access point that appears to be legitimate and is used to eavesdrop on wireless communications?
- A . Captive portal
- B . De-authentication attack
- C . Karma attack
- D . Evil twin