Lpi 303-300 LPIC-3 Security Online Training
Lpi 303-300 Online Training
The questions for 303-300 were last updated at Nov 19,2024.
- Exam Code: 303-300
- Exam Name: LPIC-3 Security
- Certification Provider: Lpi
- Latest update: Nov 19,2024
What option of mount.cifs specifies the user that appears as the local owner of the files of a mounted CIFS share when the server does not provide ownership information?
(Specify ONLY the option name without any values or parameters.)
Solution: uid=arg
Determine whether the given solution is correct?
- A . Correct
- B . Incorrect
Which of the following practices are important for the security of private keys?
(Choose TWO correct answers.)
- A . Private keys should be created on the systems where they will be used and should never leave them.
- B . Private keys should be uploaded to public key servers.
- C . Private keys should be included in X509 certificates.
- D . Private keys should have a sufficient length for the algorithm used for key generation.
- E . Private keys should always be stored as plain text files without any encryption.
What is the purpose of NSEC3 in DNSSEC?
- A . To provide information about DNSSEC key signing keys
- B . To prevent zone enumeration
- C . To authenticate a DNS server
- D . To sign a DNS zone
Which command is used to run a new shell for a user changing the SELinux context?
(Specify ONLY the command without any path or parameters.)
Solution: newrole
Determine whether the given solution is correct?
- A . Correct
- B . Incorrect
Which file is used to configure AIDE?
- A . /etc/rkhunter.conf
- B . /etc/audit/auditd.conf
- C . /etc/aide/aide.conf
- D . /etc/maldet.conf
Which of the following statements describes the purpose of ndpmon?
- A . It monitors the network for neighbor discovery messages from new IPv6 hosts and routers.
- B . It monitors remote hosts by periodically sending echo requests to them.
- C . It monitors the availability of a network link by querying network interfaces.
- D . It monitors the network for IPv4 nodes that have not yet migrated to IPv6.
- E . It monitors log files for failed login attempts in order to block traffic from offending network nodes.
What is an asymmetric key?
- A . A key used for encryption and decryption that is the same
- B . A key used for encryption that is different from the key used for decryption
- C . A key used for decryption that is different from the key used for encryption
- D . A key used for both encryption and decryption that is generated in a pair
Which of the following is an example of a behavioral-based HID technique?
- A . Signature-based detection
- B . Anomaly-based detection
- C . Heuristic-based detection
- D . Rule-based detection
Which command revokes ACL-based write access for groups and named users on the file afile?
- A . setfacl Cx group: * : rx, user:*: rx afile
- B . setfacl Cx mask: : rx afile
- C . setfacl ~m mask: : rx afile
- D . setfacl ~m group: * : rx, user :*: rx afile
Which command is used to set an extended attribute on a file in Linux?
- A . getfattr
- B . setfattr
- C . getfacl
- D . setfacl