Lpi 303-300 LPIC-3 Security Online Training
Lpi 303-300 Online Training
The questions for 303-300 were last updated at Dec 20,2024.
- Exam Code: 303-300
- Exam Name: LPIC-3 Security
- Certification Provider: Lpi
- Latest update: Dec 20,2024
Which file is used to configure rkhunter?
- A . /etc/rkhunter.conf
- B . /etc/audit/auditd.conf
- C . /etc/aide/aide.conf
- D . /etc/maldet.conf
What effect does the following command have on TCP packets?
iptables- A INPUT d 10.142.232.1 p tcp –dport 20:21 j ACCEPT
- A . Forward all TCP traffic not on port 20 or 21 to the IP address 10.142.232.1
- B . Drop all TCP traffic coming from 10.142.232.1 destined for port 20 or 21.
- C . Accept only TCP traffic from 10.142.232.1 destined for port 20 or 21.
- D . Accept all TCP traffic on port 20 and 21 for the IP address 10.142.232.1
Which of the following access control models is established by using SELinux?
- A . Security Access Control (SAC)
- B . Group Access Control (GAC)
- C . User Access Control (UAC)
- D . Discretionary Access Control (DAC)
- E . Mandatory Access Control (MAC)
Which option of the openvpn command should be used to ensure that ephemeral keys are not written to the swap space?
- A . –mlock
- B . –no-swap
- C . –root-swap
- D . –keys-no-swap
Linux Extended File Attributes are organized in namespaces. Which of the following names correspond to existing attribute namespaces?(Choose THREE correct answers.)
- A . default
- B . system
- C . owner
- D . trusted
- E . user
Which of the following terms refer to existing scan techniques with nmap?
(Choose TWO correct answers.)
- A . Xmas Scan
- B . Zero Scan
- C . FIN Scan
- D . IP Scan
- E . UDP SYN Scan
Which command is used to view the access control list of a file?
- A . ls
- B . chmod
- C . getfacl
- D . setfacl
Which of the following commands adds a new user usera to FreeIPA?
- A . useradd usera –directory ipa –gecos “User A”
- B . idap- useradd CH Idaps://ipa-server CN=UserA –attribs “Firstname: User: Lastname: A”
- C . ipa-admin create user –account usera C-fname User –iname A
- D . ipa user-add usera –first User –last A
- E . ipa-user- add usera –name “User A”
What is a man-in-the-middle attack?
- A . An attack that targets a specific user or organization
- B . An attack that aims to steal sensitive information
- C . An attack that intercepts communications between two parties to steal information
- D . An attack that floods a network or server with traffic to make it unavailable
Which of the following prefixes could be present in the output of getcifsacl?
(Choose THREE correct answers.)
- A . ACL
- B . GRANT
- C . GROUP
- D . OWNER
- E . SID