Lpi 303-300 Real Exam Questions
The questions for 303-300 were last updated at Nov 20,2024.
- Exam Code: 303-300
- Exam Name: LPIC-3 Security
- Certification Provider: Lpi
- Latest update: Nov 20,2024
What is the difference between a SetUID and SetGID bit?
- A . SetUID applies to files, while SetGID applies to directories
- B . SetUID allows a file to be executed with the permissions of the file owner, while SetGID allows a file to be executed with the permissions of the group owner
- C . SetUID allows a user to change the owner of a file, while SetGID allows a user to change the group owner of a file
- D . There is no difference between SetUID and SetGID
Which command revokes ACL-based write access for groups and named users on the file afile?
- A . setfacl Cx group: * : rx, user:*: rx afile
- B . setfacl Cx mask: : rx afile
- C . setfacl ~m mask: : rx afile
- D . setfacl ~m group: * : rx, user :*: rx afile
Which package management tools can be used to verify the integrity of installed files on a Linux system?
- A . RPM and DPKG
- B . APT and YUM
- C . dpkg and aptitude
- D . yum and zypper
Which of the following statements describes the purpose of ndpmon?
- A . It monitors the network for neighbor discovery messages from new IPv6 hosts and routers.
- B . It monitors remote hosts by periodically sending echo requests to them.
- C . It monitors the availability of a network link by querying network interfaces.
- D . It monitors the network for IPv4 nodes that have not yet migrated to IPv6.
- E . It monitors log files for failed login attempts in order to block traffic from offending network nodes.
Which file is used to configure AIDE?
- A . /etc/rkhunter.conf
- B . /etc/audit/auditd.conf
- C . /etc/aide/aide.conf
- D . /etc/maldet.conf
Which command is used to run a new shell for a user changing the SELinux context?
(Specify ONLY the command without any path or parameters.)
Solution: newrole
Determine whether the given solution is correct?
- A . Correct
- B . Incorrect
Which of the following is an example of a behavioral-based HID technique?
- A . Signature-based detection
- B . Anomaly-based detection
- C . Heuristic-based detection
- D . Rule-based detection
What is the purpose of NSEC3 in DNSSEC?
- A . To provide information about DNSSEC key signing keys
- B . To prevent zone enumeration
- C . To authenticate a DNS server
- D . To sign a DNS zone
Which of the following parameters to openssl s_client specifies the host name to use for TLS Server Name Indication?
- A . -tlsname
- B . -servername
- C . -sniname
- D . -vhost
- E . -host
Which of the following terms refer to existing scan techniques with nmap?
(Choose TWO correct answers.)
- A . Xmas Scan
- B . Zero Scan
- C . FIN Scan
- D . IP Scan
- E . UDP SYN Scan