The Secret of 303-200 exam topics

It is impossible to pass LPI 303-200 exam without any help in the short term. Come to Actualtests soon and find the most advanced, correct and guaranteed LPI 303-200 practice questions. You will get a surprising result by our Avant-garde LPIC-3 Exam 303: Security, version 2.0 practice guides.

Q11. Which of the following commands defines an audit rule that monitors read and write operations to the file/etc/firewall/rules and associates the rule with the name firewall?

A. auditctl -N firewall -r r: /etc/firewall/rules -r w: etc/firewall/rules

B. auditctl -A -f /etc/firewall/rules -o r- o w -l firewall

C. auditctl -w /etc/firewall/rules -p rw -k firewall

D. auditctl -_read /etc/firewall/rules -_write /etc/firewall/rules --label firewall

E. echo "n: firewall r:/etc/firewall/rules: w:/ etc/firewall/rules:" I auditctl ~

Answer:


Q12. Which command revokes ACL-based write access for groups and named users on the file afile?

A. setfacl -x group: * : rx, user:*: rx afile

B. setfacl -x mask: : rx afile

C. setfacl ~m mask: : rx afile

D. setfacl ~m group: * : rx, user:*: rx afile

Answer: C


Q13. How are SELinux permissions related to standard Linux permissions? (Choose TWO correct answers.)

A. SELinux permissions overnde standard Linux permissions.

B. standard Linux permissions override SELinux permissions.

C. SELinux permissions are verified before standard Linux permissions.

D. SELinux permissions are verified after standard Linux permissions.

Answer: B, D 


Q14. Which of the following commands defines an audit rule that monitors read and write operations to the file/etc/firewall/rules and associates the rule with the name firewall?

A. auditctl -N firewall -r r: /etc/firewall/rules -r w: etc/firewall/rules

B. auditctl -A -f /etc/firewall/rules -o r- o w -l firewall

C. auditctl -w /etc/firewall/rules -p rw -k firewall

D. auditctl -_read /etc/firewall/rules -_write /etc/firewall/rules --label firewall

E. echo "n: firewall r:/etc/firewall/rules: w:/ etc/firewall/rules:" I auditctl ~

Answer:


Q15. Linux Extended File Attributes are organized in namespaces. Which of the following names correspond to existing attribute namespaces? (Choose THREE correct answers.)

A. default

B. system

C. owner

D. trusted

E. user

Answer: B, D, E 


Q16. How does TSlG authenticate name servers in order to perform secured zone transfers?

A. Both servers mutually verify their X509 certificates.

B. Both servers use a secret key that is shared between the servers.

C. Both servers verify appropriate DANE records for the labels of the NS records used to delegate the transferred zone.

D. Both servers use DNSSEC to mutually verify that they are authoritative for the transferred zone.

Answer:


Q17. Which of the following commands disables the automatic password expiry for the user usera?

A. chage --maxdays none usera

B. chage -maxdays 99 usera

C. chage --maxdays -1 usera

D. chage --lastday none usera

E. chage --lastday 0 usera

Answer:


Q18. What happens when the command getfattr afile is run while the file afile has no extended attributes set?

A. getfattr prints a warning and exits with a values of 0.

B. getfattr prints a warning and exits with a value of 1.

C. No output is produced and getfattr exits with a value of 0.

D. No outputs is produced and getfattr exits with a value of 1

Answer:


Q19. Which of the following authentication methods was added to NFS in version 4?

A. Kerberos  authentication

B. SSH hostkey authentication

C. Winbind authentication

D. SSL certificate authentication

Answer: A


Q20. Which command is used to run a new shell for a user changing the SELinux context? (Specify ONLY the command without any path or parameters.)

Answer: 

newrole

Explanation: https://www.centos.ofg/docs/5/html/DeployrnenLGuide-en-US/sec-sel-admincontrol.html