Ensurepass.com : Ensure you pass the IT Exams
2018 Jan LPI Official New Released 303-200
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/303-200.html
LPIC-3 Exam 303: Security, 2.0
Question No: 1
Which of the following statements is true about chroot environments?
-
Symbolic links to data outside the chroot path are followed, making files and directories accessible
-
Hard links to files outside the chroot path are not followed, to increase security
-
The chroot path needs to contain all data required by the programs running in the chroot environment
-
Programs are not able to set a chroot path by using a function call, they have to use the command chroot
-
When using the command chroot, the started command is running in its own namespace and cannot communicate with other processes
Answer: C
Question No: 2
Which of the following DNS record types can the command dnssec-signzone add to a zone? (Choose THREE correct answers.)
-
ASIG
-
NSEC
-
NSEC3
-
NSSIG
-
RRSIG
Answer: B,C,E
Question No: 3
Which of the following prefixes could be present in the output of getcifsacl? (Choose
THREE correct answers.)
-
ACL
-
GRANT
-
GROUP
-
OWNER
-
SID
Answer: A,C,E
Question No: 4
Which of the following commands changes the source IP address to 192.0.2.11 for all IPv4 packets which go through the network interface eth0?
-
iptables ~t nat -A POSTROUTING ~o eth0 –j SNAT -to-source 192.0.2.11
-
iptables ~t nat -A PREROUT1NG -\ eth0 -j SNAT -to-source 192.0.2.11
-
iptables -t nat -A POSTROUTING H eth0 -j DNAT -to-source 192.0.2.11
-
iptables -t mangle -A POSTROUTING -i eth0 -j SNAT -to-source 192.0.2.11
-
iptables -t mangle -A POSTROUTING -0 eth0 -j SNAT -to-source 192.0.2.11
Answer: A
Question No: 5
Which of the following statements describes the purpose of ndpmon?
-
it monitors the network for neighbor discovery messages from new IPv6 hosts and routers
-
it monitors remote hosts by periodically sending echo requests to them.
-
it monitors the availability of a network link by querying network interfaces.
-
It monitors the network for IPv4 nodes that have not yet migrated to IPv6.
-
It monitors log files for failed login attempts in order to block traffic from offending network nodes
Answer: A
Question No: 6 CORRECT TEXT
Which command installs and configures a new FreelPA server, including all sub- components, and creates a new FreelPA domain? (Specially ONLY the command without any path or parameters).
Answer: ipa-server-install
https://www.freeipa.org/images/2/2b/lnstallation_and_Deployment.Guidep.pdf
Question No: 7
Which of the following statements is true regarding eCryptfs?
-
For every file in an eCryptfs directory there exists a corresponding file that contains the encrypted content.
-
The content of all files in an eCryptfs directory is stored in an archive file similar to a tar file with an additional index to improve performance.
-
After unmounting an eCryptfs directory, the directory hierarchy and the original file names are still visible, although, it is not possible to view the contents of the files.
-
When a user changes his login password, the contents of his eCryptfs home directory has to be re-encrypted using his new login password.
-
eCryptfs cannot be used to encrypt only directories that are the home directory of a regular Linux user.
Answer: E
Question No: 8
What effect does the configuration SSLStrictSNIVHostCheck on have on an Apache HTTPD virtual host?
-
The clients connecting to the virtual host must provide a client certificate that was issued by the same CA that issued the server#39;s certificate.
-
The virtual host is served only to clients that support SNI.
-
All of the names of the virtual host must be within the same DNS zone.
-
The virtual host is used as a fallback default for all clients that do not support SNI.
-
Despite its configuration, the virtual host is served only on the common name and Subject Alternative Names of the server certificates.
Answer: B
Question No: 9
Which option of the openvpn command should be used to ensure that ephemeral keys are
not written to the swap space?
-
-mlock
-
-no-swap
-
-root-swap
-
-keys-no-swap
Answer: A
Question No: 10
Which of the following keywords are built-in chairs for the iptables nat table? (Choose
THREE correct answers)
-
OUTPUT
-
MASQUERADE
-
PROCESSING
-
POSTROUTING
-
PREROUTING
Answer: A,D,E
100% Ensurepass Free Download!
–Download Free Demo:303-200 Demo PDF
100% Ensurepass Free Guaranteed!
–303-200 Dumps
EnsurePass | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |
100-105 Dumps VCE PDF
200-105 Dumps VCE PDF
300-101 Dumps VCE PDF
300-115 Dumps VCE PDF
300-135 Dumps VCE PDF
300-320 Dumps VCE PDF
400-101 Dumps VCE PDF
640-911 Dumps VCE PDF
640-916 Dumps VCE PDF
70-410 Dumps VCE PDF
70-411 Dumps VCE PDF
70-412 Dumps VCE PDF
70-413 Dumps VCE PDF
70-414 Dumps VCE PDF
70-417 Dumps VCE PDF
70-461 Dumps VCE PDF
70-462 Dumps VCE PDF
70-463 Dumps VCE PDF
70-464 Dumps VCE PDF
70-465 Dumps VCE PDF
70-480 Dumps VCE PDF
70-483 Dumps VCE PDF
70-486 Dumps VCE PDF
70-487 Dumps VCE PDF
220-901 Dumps VCE PDF
220-902 Dumps VCE PDF
N10-006 Dumps VCE PDF
SY0-401 Dumps VCE PDF