LPI Security Essentials (020-100) Certification Sample Questions

Security Essentials Dumps, 020-100 Dumps, 020-100 PDF, Security Essentials VCE, LPI 020-100 VCE, LPI Security Essentials 020 PDFThe purpose of this Sample Question Set is to provide you with information about the LPI Security Essentials - 020 exam. These sample questions will make you very familiar with both the type and the difficulty level of the questions on the 020-100 certification test. To get familiar with real exam environment, we suggest you try our Sample LPI Security Essentials Certification Practice Exam. This sample practice exam gives you the feeling of reality and is a clue to the questions asked in the actual LPI Security Essentials certification exam.

These sample questions are simple and basic questions that represent likeness to the real LPI 020-100 exam questions. To assess your readiness and performance with real time scenario based questions, we suggest you prepare with our Premium LPI Security Essentials Certification Practice Exam. When you solve real time scenario based questions practically, you come across many difficulties that give you an opportunity to improve.

LPI 020-100 Sample Questions:

01. Which role is ultimately accountable for deciding how an identified information security risk is treated?
a) Security administrator
b) Risk owner
c) System auditor
d) Incident responder
 
02. In public key cryptography, the key used to encrypt data for a specific recipient is the recipient’s __________ key.
a) Private
b) Symmetric
c) Session
d) Public
 
03. Which authentication factor is represented by a one-time password generated by a hardware token?
a) Something you know
b) Something you have
c) Something you are
d) Somewhere you are
 
04. Which practice BEST reduces the risk of unauthorized access to exposed network services?
a) Disabling unused services
b) Increasing bandwidth
c) Expanding user privileges
d) Allowing anonymous access
 
05. Which malware type is MOST difficult to detect because it hides its presence by modifying system behavior?
a) Adware
b) Virus
c) Rootkit
d) Ransomware
 
06. A system that detects suspicious activity on a network but does not actively block traffic is called an __________.
a) Intrusion Detection System
b) Firewall
c) Intrusion Prevention System
d) Proxy server
 
07. Which mechanism ensures that data exchanged between two systems has not been altered during transmission?
a) Encryption
b) Hashing
c) Compression
d) Routing
 
08. Malware designed to encrypt user files and demand payment for their release is known as __________.
a) Spyware
b) Adware
c) Ransomware
d) Keylogger
 
09. Which type of attack attempts to overwhelm a service with traffic to make it unavailable to legitimate users?
a) Phishing
b) Denial-of-Service
c) Man-in-the-Middle
d) Spoofing
 
10. Encrypting emails using standards such as S/MIME or OpenPGP primarily protects message content while it is __________.
a) In transit
b) Stored on disk
c) Being archived
d) Being deleted

Answers:

Question: 01
Answer: b
Question: 02
Answer: d
Question: 03
Answer: b
Question: 04
Answer: a
Question: 05
Answer: c
Question: 06
Answer: a
Question: 07
Answer: b
Question: 08
Answer: c
Question: 09
Answer: b
Question: 10
Answer: a

Note: For any error in LPI Security Essentials (020-100) certification exam sample questions, please update us by writing an email on feedback@edusum.com.

Rating: 5 / 5 (77 votes)