New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

LPI 303-200 LPIC-3 Exam 303: Security, 2.0 Exam Practice Test

Page: 1 / 6
Total 60 questions

LPIC-3 Exam 303: Security, 2.0 Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Which of the following resources of a shell and its child processes can be controlled by the Bash build-in command ulimit? (Choose THREE correct answers.)

Options:

A.

The maximum size of written files

B.

The maximum number of open file descriptors

C.

The maximum number of newly created files

D.

The maximum number of environment variables

E.

The maximum number of user processes

Question 2

Which of the following authentication methods was added to NFS in version 4?

Options:

A.

Kerberos authentication

B.

SSH hostkey authentication

C.

Winbind authentication

D.

SSL certificate authentication

Question 3

Which of the following lines in an OpenSSL configuration adds an X 509v3 Subject Alternative Name extension for the host names example.org and to a certificate'?

Options:

A.

subjectAltName = DNS: www example.org, DNS:example.org

B.

extension= SAN: www.example.org , SAN:example.org

C.

subjectAltName: www.example.org , subjectAltName: example.org

D.

commonName = subjectAltName= www.example.org , subjectAltName = example.org

E.

subject= CN= www.example.org , CN=example.org

Question 4

Which of the following sections are allowed within the Kerberos configuration file krb5.conf? (Choose THREE correct answers.)

Options:

A.

[plugins]

B.

[crypto]

C.

[domain]

D.

[capaths]

E.

[realms]

Question 5

Which of the following methods can be used to deactivate a rule in Snort? (Choose TWO correct answers.)

Options:

A.

By placing a # in front of the rule and restarting Snort

B.

By placing a pass rule in local.rules and restarting Snort.

C.

By deleting the rule and waiting for Snort to reload its rules files automatically.

D.

By adding a pass rule to /etc/snort/rules.deactivated and waiting for Snort to reload its rules files automatically.

Question 6

Which of the following expressions are valid AIDE rules? (Choose TWO correct answers.)

Options:

A.

!/var/run/.*

B.

append: /var/log/*

C.

/usr=all

D.

#/bin/

E.

/etc p+i+u+g

Question 7

Which of the following are differences between AppArmor and SELinux? (Choose TWO correct answers).

Options:

A.

AppArmor is implemented in user space only. SELinux is a Linux Kernel Module.

B.

AppArmor is less complex and easier to configure than SELinux.

C.

AppArmor neither requires nor allows any specific configuration. SELinux must always be manually configured.

D.

SELinux stores information in extended file attributes. AppArmor does not maintain file specific information and states.

E.

The SELinux configuration is loaded at boot time and cannot be changed later on AppArmor provides user space tools to change its behavior.

Question 8

What effect does the configuration SSLStrictSNIVHostCheck on have on an Apache HTTPD virtual host?

Options:

A.

The clients connecting to the virtual host must provide a client certificate that was issued by the same CA that issued the server's certificate.

B.

The virtual host is served only to clients that support SNI.

C.

All of the names of the virtual host must be within the same DNS zone.

D.

The virtual host is used as a fallback default for all clients that do not support SNI.

E.

Despite its configuration, the virtual host is served only on the common name and Subject Alternative Names of the server certificates.

Question 9

What command is used to update NVTs from the OpenVAS NVT feed? (Specify ONLY the command without any path or parameters).

Options:

Page: 1 / 6
Total 60 questions