Lpi 020-100 Security Essentials – Exam 020, version 1.0 Online Training
Lpi 020-100 Online Training
The questions for 020-100 were last updated at Aug 12,2025.
- Exam Code: 020-100
- Exam Name: Security Essentials - Exam 020, version 1.0
- Certification Provider: Lpi
- Latest update: Aug 12,2025
Which of the following encryption methods is used for email encryption and requires the use of a public key and a private key pair?
- A . Certificate Authority
- B . S/MIME
- C . OpenPGP
- D . SMTP STARTTLS
Which of the following is used to verify the identity of a website?
- A . X.509 digital certificate
- B . SSL/TLS
- C . Certificate Signing Request (CSR)
- D . Diffie-Hellman key exchange
Which of the following is the BEST way to securely procure and install software?
- A . Downloading software from an unsecured website
- B . Purchasing software from an unverified vendor
- C . Installing software from a USB drive
- D . Installing software from an app store
Which of the following is a network address used to identify devices in layer three of the OSI model?
- A . TCP port number
- B . DNS address
- C . MAC address
- D . IP address
What is the purpose of a rootkit?
- A . To increase network speed
- B . To encrypt data on a system
- C . To detect and remove malware
- D . To provide remote access to a system
Which of the following is a characteristic of Perfect Forward Secrecy (PFS)?
- A . It relies on a single long-term private key for all sessions.
- B . It is not used in modern encryption protocols.
- C . It generates a unique session key for each session.
- D . It uses symmetric encryption for all sessions.
What is an non-disclosure agreement (NDA)?
- A . An agreement to not disclose any information
- B . A contract that requires sharing confidential information with others in a business relationship
- C . An agreement to disclose all information
- D . An agreement to disclose some information
What is a major security concern when installing mobile applications from unknown sources?
- A . Malware infection
- B . Incompatible hardware components
- C . Reduced storage capacity
- D . Limited network connectivity
What are email spam filters?
- A . Filters used to block sensitive information sent via email
- B . Filters used to block all incoming email
- C . Filters used to block only unsolicited and unwanted email
- D . Filters used to block all outgoing email
What is end-to-end encryption?
- A . A method for optimizing website performance
- B . A software development process
- C . A type of encryption that protects data as it travels between two endpoints
- D . A technique for compressing files