What Improve 303-200 Is?

Testking 303-200 Questions are updated and all 303-200 answers are verified by experts. Once you have completely prepared with our 303-200 exam prep kits you will be ready for the real 303-200 exam without a problem. We have Improved LPI 303-200 dumps study guide. PASSED 303-200 First attempt! Here What I Did.

Q1. Which of the following commands disables the automatic password expiry for the user usera?

A. chage --maxdays none usera

B. chage -maxdays 99 usera

C. chage --maxdays -1 usera

D. chage --lastday none usera

E. chage --lastday 0 usera

Answer:


Q2. Which of the following access control models is established by using SELinux?

A. Security Access Control (SAC)

B. Group Access Control (GAC)

C. User Access Control (UAC)

D. Discretionary Access Control (DAC)

E. Mandatory Access Control (MAC)

Answer: E


Q3. Which of the following sections are allowed within the Kerberos configuration file krb5.conf? (Choose THREE correct answers.)

A. [plugins]

C. [crypto]

C. [domain]

D. [capaths]

E. [realms]

Answer: A, D, E 


Q4. Which of the following types can be specified within the Linux Audit system? (Choose THREE correct answers)

A. Control rules

B. File system rules

C. Network connection rules

D. Console rules

E. System call rules

Answer: A, B, E 


Q5. What option of mount.cifs specifies the user that appears as the local owner of the files of a mounted ClFS share when the server does not provide ownership information? (Specify ONLY the option name without any values or parameters.)

Answer: 

uld=arg

Explanation: http://linux.die.net/man/8/mount.cifs


Q6. What option of mount.cifs specifies the user that appears as the local owner of the files of a mounted ClFS share when the server does not provide ownership information? (Specify ONLY the option name without any values or parameters.)

Answer: 

uld=arg

Explanation: http://linux.die.net/man/8/mount.cifs


Q7. Which of the following DNS record types can the command dnssec-signzone add to a zone? (Choose THREE correct answers.)

A. ASlG

B. NSEC

C. NSEC3

D. NSSlG

E. RRSlG

Answer: B, C, E 


Q8. in which path is the data, which can be altered by the sysctl command, accessible?

A. /dev/sys/

B. /sys/

C. /proc/sys/

D. /sysctl/

Answer:


Q9. How does TSlG authenticate name servers in order to perform secured zone transfers?

A. Both servers mutually verify their X509 certificates.

B. Both servers use a secret key that is shared between the servers.

C. Both servers verify appropriate DANE records for the labels of the NS records used to delegate the transferred zone.

D. Both servers use DNSSEC to mutually verify that they are authoritative for the transferred zone.

Answer:


Q10. Which of the following types can be specified within the Linux Audit system? (Choose THREE correct answers)

A. Control rules

B. File system rules

C. Network connection rules

D. Console rules

E. System call rules

Answer: A, B, E