Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

303-200 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

303-200 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: 303-200: LPIC-3 Exam 303: Security, version 2.0
  • Last Update: Jul 23, 2024
  • Questions and Answers: 60
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

303-200 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

303-200 Practice Exam Questions with Answers 303-200: LPIC-3 Exam 303: Security, version 2.0 Certification

Question # 6

Which of the following authentication methods was added to NFS in version 4?

A.

Kerberos authentication

B.

SSH hostkey authentication

C.

Winbind authentication

D.

SSL certificate authentication

Full Access
Question # 7

Which of the following lines in an OpenSSL configuration adds an X 509v3 Subject Alternative Name extension for the host names example.org and www.example.org to a certificate'?

A.

subjectAltName = DNS: www example.org, DNS:example.org

B.

extension= SAN: www.example.org , SAN:example.org

C.

subjectAltName: www.example.org , subjectAltName: example.org

D.

commonName = subjectAltName= www.example.org , subjectAltName = example.org

E.

subject= CN= www.example.org , CN=example.org

Full Access
Question # 8

Which of the following prefixes could be present in the output of getcifsacl? (Choose THREE correct answers.)

A.

ACL

B.

GRANT

C.

GROUP

D.

OWNER

E.

SID

Full Access
Question # 9

Which of the following parameters to openssl s_client specifies the host name to use for TLS Server Name Indication?

A.

-tlsname

B.

-servername

C.

-sniname

D.

-vhost

E.

-host

Full Access
Question # 10

Which command revokes ACL-based write access for groups and named users on the file afile?

A.

setfacI -x group: * : rx, user:*: rx afile

B.

setfacl -x mask: : rx afile

C.

setfacl ~m mask: : rx afile

D.

setfacl ~m group: * : rx, user:*: rx afile

Full Access
Question # 11

Given that this device has three different keys, which of the following commands deletes only the first key?

A.

cryptsetup luksDelKey /dev/sda 1 0

B.

cryptsetup luksDelkey /dev/sda 1 1

C.

cryptsetup luksDelKey / dev /mapper/crypt- vol 1

D.

cryptsetup luksDelKey / dev /mapper/crypt- vol 0

Full Access
Question # 12

Which of the following commands displays all ebtable rules contained in the table filter including their packet and byte counters?

A.

ebtables -t nat -L -v

B.

ebtables-L-t filter -Lv

C.

ebtables-t filter-L-Lc

D.

ebtables -t filter -Ln -L

E.

ebtables-L -Lc-t filter

Full Access
Question # 13

Which of the following statements describes the purpose of ndpmon?

A.

it monitors the network for neighbor discovery messages from new IPv6 hosts and routers

B.

it monitors remote hosts by periodically sending echo requests to them.

C.

it monitors the availability of a network link by querying network interfaces.

D.

It monitors the network for IPv4 nodes that have not yet migrated to IPv6.

E.

It monitors log files for failed login attempts in order to block traffic from offending network nodes

Full Access
Question # 14

Which command included in the Linux Audit system provides searching and filtering of the audit log? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 15

Which command is used to run a new shell for a user changing the SELinux context? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 16

Which of the following access control models is established by using SELinux?

A.

Security Access Control (SAC)

B.

Group Access Control (GAC)

C.

User Access Control (UAC)

D.

Discretionary Access Control (DAC)

E.

Mandatory Access Control (MAC)

Full Access
Question # 17

Which directive is used in an OpenVPN server configuration in order to send network configuration information to the client? (Specify ONLY the option name without any values or parameters.)

Full Access
Question # 18

in which path is the data, which can be altered by the sysctl command, accessible?

A.

/dev/sys/

B.

/sys/

C.

/proc/sys/

D.

/sysctl/

Full Access