[Free] 2018(Jan) EnsurePass Testinsides LPI 303-200 Dumps with VCE and PDF 21-30

By | February 12, 2018

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan LPI Official New Released 303-200
100% Free Download! 100% Pass Guaranteed!

LPIC-3 Exam 303: Security, 2.0

Question No: 21

Which of the following commands defines an audit rule that monitors read and write operations to the file/ etc/firewall/rules and associates the rule with the name firewall?

  1. auditctl -N firewall -r r: /etc/firewall/rules -r w: etc/firewall/rules

  2. auditctl -A -f /etc/firewall/rules -o r- o w -l firewall

  3. auditctl -w /etc/firewall/rules -p rw -k firewall

  4. auditctl -_read /etc/firewall/rules -_write /etc/firewall/rules -label firewall

  5. echo quot;n: firewall r:/etc/firewall/rules: w:/ etc/firewall/rules:quot; | auditctl ~

Answer: C

Question No: 22 CORRECT TEXT

What option of mount.cifs specifies the user that appears as the local owner of the files of a mounted CIFS share when the server does not provide ownership information? (Specify ONLY the option name without any values or parameters.)

Answer: uld=arg http://linux.die.net/man/8/mount.cifs

Question No: 23

Given a proper network and name resolution setup, which of the following commands establishes a trust between a FreelPA domain and an Active Directory domain?

  1. ipa trust-add -type ad addom -admin Administrator -password

  2. ipa-ad -add-trust -account ADDOM\Administrator-query-password

  3. net ad ipajoin addom -U Administrator -p

  4. trustmanager add -_domain ad: //addom -user Administrator -w

  5. ipa ad join addom -U Administrator -w

Answer: A

Question No: 24

Which of the following practices are important for the security of private keys? (Choose TWO correct answers.)

  1. Private keys should be created on the systems where they will be used and should never leave them.

  2. private keys should be uploaded to public key servers.

  3. Private keys should be included in X509 certificates.

  4. Private keys should have a sufficient length for the algorithm used for key generation.

  5. Private keys should always be stored as plain text files without any encryption.

Answer: C,D

Question No: 25

Which of the following commands makes the contents of the eCryptfs encrypted directory –

/Private available to the user?

  1. ecryptfsclient

  2. ecryptfs.mount

  3. ecryptfs-mount-private

  4. decryptfs

  5. ecryptfs-manage-di rectory

Answer: C

Question No: 26

Which of the following commands adds users using SSSD#39;s local service?

  1. sss_adduser

  2. sss_useradd

  3. sss_add

  4. sss-addlocaluser

  5. sss_local_adduser

Answer: B

Question No: 27

Which of the following are differences between AppArmor and SELinux? (Choose TWO correct answers).

  1. AppArmor is implemented in user space only. SELinux is a Linux Kernel Module.

  2. AppArmor is less complex and easier to configure than SELinux.

  3. AppArmor neither requires nor allows any specific configuration. SELinux must always be manually configured.

  4. SELinux stores information in extended file attributes. AppArmor does not maintain file specific information and states.

  5. The SELinux configuration is loaded at boot time and cannot be changed later on AppArmor provides user space tools to change its behavior.

Answer: B,D

Question No: 28

What effect does the following command have on TCP packets?

iptables- A INPUT -d 10 142 232.1 -p tcp -dport 20:21 -j ACCEPT

  1. Forward all TCP traffic not on port 20 or 21 to the IP address 10.142 232.1

  2. Drop all TCP traffic coming from 10 142 232.1 destined for port 20 or 21.

  3. Accept only TCP traffic from 10.142 232.1 destined for port 20 or 21.

  4. Accept all TCP traffic on port 20 and 21 for the IP address

Answer: C

Question No: 29 CORRECT TEXT

Which command included in the Linux Audit system provides searching and filtering of the audit log? (Specify ONLY the command without any path or parameters.)

Answer: ausearch

Question No: 30

Which of the following components are part of FreeIPA? (Choose THREE correct answers.)

  1. DHCP Server

  2. Kerberos KDC

  3. Intrusion Detection System

  4. Public Key Infrastructure

  5. Directory Server

Answer: B,D,E

100% Ensurepass Free Download!
Download Free Demo:303-200 Demo PDF
100% Ensurepass Free Guaranteed!
303-200 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.