This page was exported from IT Certification Exam Braindumps [ http://blog.braindumpsit.com ] Export date:Sat Apr 12 19:14:51 2025 / +0000 GMT ___________________________________________________ Title: 020-100 Dumps with Free 365 Days Update Fast Exam Updates [Q52-Q71] --------------------------------------------------- 020-100 Dumps with Free 365 Days Update Fast Exam Updates Verified 020-100 dumps Q&As - 2025 Latest 020-100 Download Q52. Which of the following terms refers to the deliberate act of accessing, manipulating, or deleting data without authorization?Response:  Firewall  Encryption  Phishing  Hacking Q53. What do you call an attack that occurs when a process in a program stores data outside the memory range allocated by the developer, potentially overwriting the return address of the pointer and executing malicious code?Response:  Malware injection  Privilege escalation  Buffer overflow  Denial of service Q54. Which of the following is a widely used hash function that creates a 128-bit unique hash value?Response:  SHA-1  SHA-2  MD5  RIPEMD-160 Q55. Which of the following is a service that allows users to upload and download public PGP keys?Response:  Mozilla Thunderbird  Twitter  OpenPGP key server  S/MIME certificate authority Q56. Which of the following is a router that is used as a gateway to forward traffic from a device to other networks?Response:  Default Gateway  Switch  Modem  Access Point Q57. Which of the following is a common method for malware to gain remote access to a system?Response:  Keylogging  Backdoors  Camera hijacking  File copying Q58. What is the purpose of the The Onion Router (TOR) network?Response:  Anonymity and Privacy  Network Monitoring  Data Storage  Speed Optimization Q59. What type of malware is specifically designed to conceal its existence and activities on a system?Response:  Rootkit  Ransomware  Cryptominer  Trojan Q60. Which tool can help protect your privacy by preventing user tracking through browser fingerprinting?Response:  HTTP cookies  User tracking software  Script blockers  Ad blockers Q61. Which encryption tool can be used to encrypt an entire storage device on Windows?Response:  Bitlocker  FileVault2  Cryptomator  Veracrypt Q62. You are concerned about your internet activity being monitored by your employer. Which of the following solutions would be the most appropriate for protecting your privacy?Response:  Using a Virtual Private Network (VPN) on your personal device.  Using incognito or private browsing mode on your work computer  Clearing your browsing history and cache on your work computer  Using a proxy server on your work computer Q63. What do web browsers check when verifying the validity of an X.509 certificate?Response:  subjectAltName  Expiration date and issuer  Key usage  Subject Q64. Which of the following is the role of certificates for S/MIME?Response:  Certificates for S/MIME are only used with certain email clients.  They provide digital signatures and encryption capabilities for email communications.  Certificates for S/MIME manage email communications.  Certificates for S/MIME provide antivirus protection for email communications. Q65. What is the purpose of transport encryption?Response:  To protect data at rest  To protect data in transit from eavesdropping and tampering  To protect data from physical theft  To protect against malware and viruses Q66. Which of the following is a free and open-source implementation of the OpenPGP encryption standard?Response:  S/MIME  GnuPGP  Microsoft Outlook  Mozilla Thunderbird Q67. Which of the following provides even stronger security through the use of Simultaneous Authentication of Equals (SAE) encryption?Response:  WPA3  WPA2  WEP  WPA Q68. Which of the following is the role of OpenPGP key servers?Response:  OpenPGP key servers manage email communications.  OpenPGP key servers are only used with Mozilla Thunderbird.  OpenPGP key servers provide antivirus protection for email communications.  They allow users to store and retrieve public keys associated with an email address. Q69. What is a proxy server?Response:  A content delivery network (CDN)  A firewall for network security  A virtual private network (VPN) service  A server that is used to filter network traffic Q70. Which of the following is a type of software that is embedded in hardware devices and provides instructions to the hardware to perform specific tasks?Response:  Desktop applications  Server software  Firmware  Web applications Q71. Which of the following sources is typically considered safe for downloading mobile applications?Response:  Peer-to-peer file-sharing networks  Official app stores  Unknown third-party websites  Unsolicited email attachments  Loading … Updated Lpi Study Guide 020-100 Dumps Questions: https://www.braindumpsit.com/020-100_real-exam.html --------------------------------------------------- Images: https://blog.braindumpsit.com/wp-content/plugins/watu/loading.gif https://blog.braindumpsit.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2025-03-13 11:18:03 Post date GMT: 2025-03-13 11:18:03 Post modified date: 2025-03-13 11:18:03 Post modified date GMT: 2025-03-13 11:18:03