Summer Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

303-200 Sample Questions Answers

Questions 4

Which of the following commands adds users using SSSD's local service?

Options:

A.

sss_adduser

B.

sss_useradd

C.

sss_add

D.

sss-addlocaluser

E.

sss_local_adduser

Buy Now
Questions 5

Which of the following expressions are valid AIDE rules? (Choose TWO correct answers.)

Options:

A.

!/var/run/.*

B.

append: /var/log/*

C.

/usr=all

D.

#/bin/

E.

/etc p+i+u+g

Buy Now
Questions 6

Which of the following terms refer to existing scan techniques with nmap? (Choose TWO correct answers.)

Options:

A.

Xmas Scan

B.

Zero Scan

C.

FIN Scan

D.

IP Scan

E.

UDP SYN Scan

Buy Now
Questions 7

Which of the following statements are true regarding the certificate of a Root CA? (Choose TWO correct answers.)

Options:

A.

It is a self-signed certificate.

B.

It does not include the private key of the CA

C.

It must contain a host name as the common name.

D.

It has an infinite lifetime and never expires.

E.

It must contain an X509v3 Authority extension.

Buy Now
Questions 8

Which of the following access control models is established by using SELinux?

Options:

A.

Security Access Control (SAC)

B.

Group Access Control (GAC)

C.

User Access Control (UAC)

D.

Discretionary Access Control (DAC)

E.

Mandatory Access Control (MAC)

Buy Now
Questions 9

Which of the following statements is true about chroot environments?

Options:

A.

Symbolic links to data outside the chroot path are followed, making files and directories accessible

B.

Hard links to files outside the chroot path are not followed, to increase security

C.

The chroot path needs to contain all data required by the programs running in the chroot environment

D.

Programs are not able to set a chroot path by using a function call, they have to use the command chroot

E.

When using the command chroot, the started command is running in its own namespace and cannot communicate with other processes

Buy Now
Questions 10

Which of the following commands displays all ebtable rules contained in the table filter including their packet and byte counters?

Options:

A.

ebtables -t nat -L -v

B.

ebtables-L-t filter -Lv

C.

ebtables-t filter-L-Lc

D.

ebtables -t filter -Ln -L

E.

ebtables-L -Lc-t filter

Buy Now
Questions 11

Which of the following resources of a shell and its child processes can be controlled by the Bash build-in command ulimit? (Choose THREE correct answers.)

Options:

A.

The maximum size of written files

B.

The maximum number of open file descriptors

C.

The maximum number of newly created files

D.

The maximum number of environment variables

E.

The maximum number of user processes

Buy Now
Questions 12

Which of the following types can be specified within the Linux Audit system? (Choose THREE correct answers)

Options:

A.

Control rules

B.

File system rules

C.

Network connection rules

D.

Console rules

E.

System call rules

Buy Now
Questions 13

Which of the following commands adds a new user usera to FreelPA?

Options:

A.

useradd usera --directory ipa --gecos *User A"

B.

idap- useradd --H ldaps://ipa-server CN=UserA --attribs "Firstname: User: Lastname: A"

C.

ipa-admin create user --account usera -_fname User --iname A

D.

ipa user-add usera --first User --last A

E.

ipa-user- add usera --name "User A"

Buy Now
Questions 14

Which command, included in BIND, generates DNSSEC keys? (Specify ONLY the command without any path or parameters.)

Options:

Buy Now
Questions 15

Which of the following sections are allowed within the Kerberos configuration file krb5.conf? (Choose THREE correct answers.)

Options:

A.

[plugins]

B.

[crypto]

C.

[domain]

D.

[capaths]

E.

[realms]

Buy Now
Questions 16

Linux Extended File Attributes are organized in namespaces. Which of the following names correspond to existing attribute namespaces? (Choose THREE correct answers.)

Options:

A.

default

B.

system

C.

owner

D.

trusted

E.

user

Buy Now
Questions 17

Given that this device has three different keys, which of the following commands deletes only the first key?

Options:

A.

cryptsetup luksDelKey /dev/sda 1 0

B.

cryptsetup luksDelkey /dev/sda 1 1

C.

cryptsetup luksDelKey / dev /mapper/crypt- vol 1

D.

cryptsetup luksDelKey / dev /mapper/crypt- vol 0

Buy Now
Questions 18

Which of the following statements is used in a parameter file for setkey in order to create a new SPD entry?

Options:

A.

spd

B.

addspd

C.

newspd

D.

spdnew

E.

spdadd

Buy Now
Exam Code: 303-200
Exam Name: 303-200: LPIC-3 Exam 303: Security, version 2.0
Last Update: May 15, 2024
Questions: 60
$64  $159.99
$48  $119.99
$40  $99.99
buy now 303-200