Pass4itsure > Lpi > LPIC-3 > 303-200 > 303-200 Online Practice Questions and Answers

303-200 Online Practice Questions and Answers

Questions 4

Which command revokes ACL-based write access for groups and named users on the file afile?

A. setfacl -x group: * : rx, user:*: rx afile

B. setfacl -x mask: : rx afile

C. setfacl ~m mask: : rx afile

D. setfacl ~m group: * : rx, user:*: rx afile

Buy Now
Questions 5

Which of the following access control models is established by using SELinux?

A. Security Access Control (SAC)

B. Group Access Control (GAC)

C. User Access Control (UAC)

D. Discretionary Access Control (DAC)

E. Mandatory Access Control (MAC)

Buy Now
Questions 6

Which of the following prefixes could be present in the output of get cifsacl? (Choose THREE correct answers.)

A. ACL

B. GRANT

C. GROUP

D. OWNER

E. SlD

Buy Now
Questions 7

Which of the following types can be specified within the Linux Audit system? (Choose THREE correct answers)

A. Control rules

B. File system rules

C. Network connection rules

D. Console rules

E. System call rules

Buy Now
Questions 8

How does TSlG authenticate name servers in order to perform secured zone transfers?

A. Both servers mutually verify their X509 certificates.

B. Both servers use a secret key that is shared between the servers.

C. Both servers verify appropriate DANE records for the labels of the NS records used to delegate the transferred zone.

D. Both servers use DNSSEC to mutually verify that they are authoritative for the transferred zone.

Buy Now
Questions 9

Which of the following statements is true regarding eCryptfs?

A. For every file in an eCryptfs directory there exists a corresponding file that contains the encrypted content.

B. The content of all files in an eCryptfs directory is stored in an archive file similar to a tar file with an additional index to improve performance.

C. After unmounting an eCryptfs directory, the directory hierarchy and the original file names are still visible, although, it is not possible to view the contents of the files.

D. When a user changes his login password, the contents of his eCryptfs home directory has to be re-encrypted using his new login password.

E. eCryptfs cannot be used to encrypt only directories that are the home directory of a regular Linux user.

Buy Now
Questions 10

Which of the following command lines sets the administrator password for ntop to testing 123?

A. ntop --set-admin-password=testing123

B. ntop --set-password-testing123

C. ntop --reset-password=testing 123

D. ntop --set-new-password=testing123

Buy Now
Questions 11

Which of the following keywords are built-in chairs for the iptables nat table? (Choose THREE correct answers)

A. OUTPUT

B. MASQUERADE

C. PROCESSlNG

D. POSTROUTlNG

E. PREROUTlNG

Buy Now
Questions 12

Which of the following statements are valid wireshark capture filters? (Choose TWO correct answers.)

A. port range 10000:tcp-15000:tcp

B. port-range tcp 10000-15000

C. tcp portrange 10000-15000

D. portrange 10000/tcp-15000/tcp

E. portrange 10000-15000 and tcp

Buy Now
Questions 13

What effect does the following command have on TCP packets? iptables- A lNPUT -d 10 142 232.1 -p tcp -dport 20:21 -j ACCEPT

A. Forward all TCP traffic not on port 20 or 21 to the lP address 10.142 232.1

B. Drop all TCP traffic coming from 10 142 232.1 destined for port 20 or 21.

C. Accept only TCP traffic from 10.142 232.1 destined for port 20 or 21.

D. Accept all TCP traffic on port 20 and 21 for the lP address 10.142.232.1

Buy Now
Exam Code: 303-200
Exam Name: LPIC-3 Exam 303: Security, version 2.0
Last Update: May 03, 2024
Questions: 60
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99