Vcehome > Lpi > LPIC-3 > 303-200 > 303-200 Online Practice Questions and Answers

303-200 Online Practice Questions and Answers

Questions 4

Which command revokes ACL-based write access for groups and named users on the file afile?

A. setfacl -x group: * : rx, user:*: rx afile

B. setfacl -x mask: : rx afile

C. setfacl ~m mask: : rx afile

D. setfacl ~m group: * : rx, user:*: rx afile

Browse 60 Q&As
Questions 5

Which command is used to run a new shell for a user changing the SELinux context? (Specify ONLY the command without any path or parameters.)

Browse 60 Q&As
Questions 6

Which of the following types can be specified within the Linux Audit system? (Choose THREE correct answers)

A. Control rules

B. File system rules

C. Network connection rules

D. Console rules

E. System call rules

Browse 60 Q&As
Questions 7

Which of the following commands adds users using SSSD's local service?

A. sss_adduser

B. sss_useradd

C. sss_add

D. sss-addlocaluser

E. sss_local_adduser

Browse 60 Q&As
Questions 8

How does TSlG authenticate name servers in order to perform secured zone transfers?

A. Both servers mutually verify their X509 certificates.

B. Both servers use a secret key that is shared between the servers.

C. Both servers verify appropriate DANE records for the labels of the NS records used to delegate the transferred zone.

D. Both servers use DNSSEC to mutually verify that they are authoritative for the transferred zone.

Browse 60 Q&As
Questions 9

Given that this device has three different keys, which of the following commands deletes only the first key?

A. cryptsetup luksDelKey/dev/sda 10

B. cryptsetup luksDelkey /dev/sda 11

C. cryptsetup luksDelKey/dev /mapper/crypt- vol 1

D. cryptsetup luksDelKey /dev/mapper/crypt- vol 0

Browse 60 Q&As
Questions 10

Which of the following practices are important for the security of private keys? (Choose TWO correct answers.)

A. Private keys should be created on the systems where they will be used and should never leave them.

B. Private keys should be uploaded to public key servers.

C. Private keys should be included in X509 certificates.

D. Private keys should have a sufficient length for the algorithm used for key generation.

E. Private keys should always be stored as plain text files without any encryption.

Browse 60 Q&As
Questions 11

Which of the following commands displays all ebtable rules contained in the table filter including their packet and byte counters?

A. ebtables -t nat -L -v

B. ebtables-L-t filter -Lv

C. ebtables -t filter –L --Lc

D. ebtables -t filter -Ln -L

E. ebtables-L -Lc-t filter

Browse 60 Q&As
Questions 12

What effect does the following command have on TCP packets? iptables- A lNPUT -d 10 142 232.1 -p tcp -dport 20:21 -j ACCEPT

A. Forward all TCP traffic not on port 20 or 21 to the lP address 10.142 232.1

B. Drop all TCP traffic coming from 10 142 232.1 destined for port 20 or 21.

C. Accept only TCP traffic from 10.142 232.1 destined for port 20 or 21.

D. Accept all TCP traffic on port 20 and 21 for the lP address 10.142.232.1

Browse 60 Q&As
Questions 13

Which of the following statements is used in a parameter file for setkey in order to create a new SPD entry?

A. spd

B. addspd

C. newspd

D. spdnew

E. spdadd

Browse 60 Q&As
Exam Code: 303-200
Exam Name: LPIC-3 Exam 303: Security, version 2.0
Last Update: Apr 25, 2024
Questions: 60 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99