Lpi 303-300 LPIC-3 Security Online Training
Lpi 303-300 Online Training
The questions for 303-300 were last updated at Dec 19,2024.
- Exam Code: 303-300
- Exam Name: LPIC-3 Security
- Certification Provider: Lpi
- Latest update: Dec 19,2024
What is a honeypot?
- A . A type of virus
- B . A network security tool designed to lure attackers into a trap
- C . A type of phishing scam
- D . A type of denial-of-service attack
Which of the following is used to perform DNSSEC validation on behalf of clients?
- A . Recursive name server
- B . Authoritative name server
- C . Secondary name server
- D . Primary name server
Given a proper network and name resolution setup, which of the following commands establishes a trust between a FreeIPA domain and an Active Directory domain?
- A . ipa trust-add –type ad addom –admin Administrator –password
- B . ipa-ad Cadd-trust –account ADDOMAdministrator–query-password
- C . net ad ipajoin addom CU Administrator -p
- D . trustmanager add C-domain ad: //addom –user Administrator Cw
- E . ipa ad join addom -U Administrator -w
Which of the following command lines sets the administrator password for ntop to testing 123?
- A . ntop –set-admin-password=testing123
- B . ntop –set-password=testing123
- C . ntop –reset-password=testing123
- D . ntop –set-new-password=testing123
What is a symmetric key?
- A . A key used for encryption and decryption that is the same
- B . A key used for encryption that is different from the key used for decryption
- C . A key used for decryption that is different from the key used for encryption
- D . A key used for both encryption and decryption that is generated randomly
What is privilege escalation?
- A . An attack that targets a specific user or organization
- B . An attack that aims to steal sensitive information
- C . An attack that exploits a vulnerability to gain elevated privileges
- D . An attack that floods a network or server with traffic to make it unavailable
Which PAM module checks new passwords against dictionary words and enforces complexity?
(Specially the module name only without any path.)
Solution: pam_cracklib
Determine whether the given solution is correct?
- A . Correct
- B . Incorrect
What is the purpose of TSIG in DNS?
- A . To encrypt DNS queries
- B . To sign DNS messages for secure communication
- C . To provide information about DNS servers
- D . To map a domain name to an IP address
What is the purpose of IP sets?
- A . They group together IP addresses that are assigned to the same network interfaces.
- B . They group together IP addresses and networks that can be referenced by the network routing table.
- C . They group together IP addresses that can be referenced by netfilter rules.
- D . They group together IP and MAC addresses used by the neighbors on the local network.
- E . They group together IP addresses and user names that can be referenced from /etc/hosts.allow and /etc/hosts.deny
What is the purpose of an extended attribute in Linux?
- A . To store additional metadata about a file
- B . To encrypt a file for secure transmission
- C . To compress a file to save disk space
- D . To mark a file as executable