Lpi 303-300 Dumps
 
Notifications
Clear all

Lpi 303-300 Dumps

72 Posts
45 Users
0 Reactions
133 Views
(@lessmannbernie)
Estimable Member
Joined: 2 months ago
Posts: 113
 

Free Lpi 303-300 Dumps are shared online. You can view and discuss Lpi 303-300 questions and answers for free below. FreeLPIC-3 Security Exam Questions.


   
Quote
Topic Tags
 Man
(@berenguerman)
Estimable Member
Joined: 3 months ago
Posts: 143
 

What option of mount.cifs specifies the user that appears as the local owner of the files of a mounted CIFS share when the server does not provide ownership information?

(Specify ONLY the option name without any values or parameters.)

Solution: uid=arg

Determine whether the given solution is correct?

  • A . Correct
  • B . Incorrect

Show Answer Hide Answer

Suggested Answer: A

   
ReplyQuote
(@rosendodustin)
Estimable Member
Joined: 2 months ago
Posts: 130
 

Which of the following practices are important for the security of private keys?

(Choose TWO correct answers.)

  • A . Private keys should be created on the systems where they will be used and should never leave them.
  • B . Private keys should be uploaded to public key servers.
  • C . Private keys should be included in X509 certificates.
  • D . Private keys should have a sufficient length for the algorithm used for key generation.
  • E . Private keys should always be stored as plain text files without any encryption.

Show Answer Hide Answer

Suggested Answer: C D

   
ReplyQuote
(@palmoahmad)
Estimable Member
Joined: 2 months ago
Posts: 144
 

What is the purpose of NSEC3 in DNSSEC?

  • A . To provide information about DNSSEC key signing keys
  • B . To prevent zone enumeration
  • C . To authenticate a DNS server
  • D . To sign a DNS zone

Show Answer Hide Answer

Suggested Answer: B

   
ReplyQuote
(@lessmannbernie)
Estimable Member
Joined: 2 months ago
Posts: 113
 

Which command is used to run a new shell for a user changing the SELinux context?

(Specify ONLY the command without any path or parameters.)

Solution: newrole

Determine whether the given solution is correct?

  • A . Correct
  • B . Incorrect

Show Answer Hide Answer

Suggested Answer: A

   
ReplyQuote
 Man
(@berenguerman)
Estimable Member
Joined: 3 months ago
Posts: 143
 

Which file is used to configure AIDE?

  • A . /etc/rkhunter.conf
  • B . /etc/audit/auditd.conf
  • C . /etc/aide/aide.conf
  • D . /etc/maldet.conf

Show Answer Hide Answer

Suggested Answer: C

   
ReplyQuote
 Yong
(@deblieckyong)
Estimable Member
Joined: 3 months ago
Posts: 119
 

Which of the following statements describes the purpose of ndpmon?

  • A . It monitors the network for neighbor discovery messages from new IPv6 hosts and routers.
  • B . It monitors remote hosts by periodically sending echo requests to them.
  • C . It monitors the availability of a network link by querying network interfaces.
  • D . It monitors the network for IPv4 nodes that have not yet migrated to IPv6.
  • E . It monitors log files for failed login attempts in order to block traffic from offending network nodes.

Show Answer Hide Answer

Suggested Answer: A

   
ReplyQuote
 Chet
(@everettschet)
Estimable Member
Joined: 3 months ago
Posts: 116
 

What is an asymmetric key?

  • A . A key used for encryption and decryption that is the same
  • B . A key used for encryption that is different from the key used for decryption
  • C . A key used for decryption that is different from the key used for encryption
  • D . A key used for both encryption and decryption that is generated in a pair

Show Answer Hide Answer

Suggested Answer: D

   
ReplyQuote
(@gauglerchauncey)
Estimable Member
Joined: 2 months ago
Posts: 127
 

Which of the following is an example of a behavioral-based HID technique?

  • A . Signature-based detection
  • B . Anomaly-based detection
  • C . Heuristic-based detection
  • D . Rule-based detection

Show Answer Hide Answer

Suggested Answer: B

   
ReplyQuote
(@weissbrodtdewayne)
Estimable Member
Joined: 3 months ago
Posts: 114
 

Which command revokes ACL-based write access for groups and named users on the file afile?

  • A . setfacl Cx group: * : rx, user:*: rx afile
  • B . setfacl Cx mask: : rx afile
  • C . setfacl ~m mask: : rx afile
  • D . setfacl ~m group: * : rx, user :*: rx afile

Show Answer Hide Answer

Suggested Answer: C

   
ReplyQuote
(@bivingskraig)
Estimable Member
Joined: 2 months ago
Posts: 155
 

Which command is used to set an extended attribute on a file in Linux?

  • A . getfattr
  • B . setfattr
  • C . getfacl
  • D . setfacl

Show Answer Hide Answer

Suggested Answer: B

   
ReplyQuote
 Abe
(@medellabe)
Estimable Member
Joined: 2 months ago
Posts: 117
 

Which option in an Apache HTTPD configuration file enables OCSP stapling?

(Specify ONLY the option name without any values or parameters.)

Solution: httpd-ssl.conf

Determine whether the given solution is correct?

  • A . Correct
  • B . Incorrect

Show Answer Hide Answer

Suggested Answer: B

   
ReplyQuote
(@boenjordan)
Estimable Member
Joined: 2 months ago
Posts: 148
 

Which of the following database names can be used within a Name Service Switch (NSS) configuration file?(Choose THREE correct answers).

  • A . host
  • B . shadow
  • C . service
  • D . passwd
  • E . group

Show Answer Hide Answer

Suggested Answer: B D E

   
ReplyQuote
(@knerrjarrett)
Estimable Member
Joined: 2 months ago
Posts: 125
 

Which of the following parameters to openssl s_client specifies the host name to use for TLS Server Name Indication?

  • A . -tlsname
  • B . -servername
  • C . -sniname
  • D . -vhost
  • E . -host

Show Answer Hide Answer

Suggested Answer: B

   
ReplyQuote
(@boenjordan)
Estimable Member
Joined: 2 months ago
Posts: 148
 

Which of the following lines in an OpenSSL configuration adds an X 509v3 Subject Alternative Name extension for the host names example.org and www.example.org to a certificate?

  • A . subjectAltName = DNS: www.example.org, DNS:example.org
  • B . extension= SAN: www.example.org, SAN:example.org
  • C . subjectAltName: www.example.org, subjectAltName: example.org
  • D . commonName = subjectAltName= www.example.org, subjectAltName = example.org
  • E . subject= CN= www.example.org, CN=example.org

Show Answer Hide Answer

Suggested Answer: A

   
ReplyQuote
Page 1 / 5
Share: