New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free LPI 303-200 Practice Exam with Questions & Answers

Questions 1

Which of the following database names can be used within a Name Service Switch (NSS) configuration file? (Choose THREE correct answers).

Options:
A.

host

B.

shadow

C.

service

D.

passwd

E.

group

LPI 303-200 Premium Access
Questions 2

Which command included in the Linux Audit system provides searching and filtering of the audit log? (Specify ONLY the command without any path or parameters.)

Options:
Questions 3

Linux Extended File Attributes are organized in namespaces. Which of the following names correspond to existing attribute namespaces? (Choose THREE correct answers.)

Options:
A.

default

B.

system

C.

owner

D.

trusted

E.

user

Questions 4

Which of the following DNS record types can the command dnssec-signzone add to a zone? (Choose THREE correct answers.)

Options:
A.

ASIG

B.

NSEC

C.

NSEC3

D.

NSSIG

E.

RRSIG

Questions 5

Which of the following components are part of FreeIPA? (Choose THREE correct answers.)

Options:
A.

DHCP Server

B.

Kerberos KDC

C.

Intrusion Detection System

D.

Public Key Infrastructure

E.

Directory Server

Questions 6

What is the purpose of IP sets?

Options:
A.

They group together IP addresses that are assigned to the same network interfaces.

B.

They group together IP addresses and networks that can be referenced by the network routing table.

C.

They group together IP addresses that can be referenced by netfilter rules.

D.

They group together IP and MAC addresses used by the neighbors on the local network.

E.

They group together IP addresses and user names that can be referenced from /etc/hosts allow and /etc/hosts deny

Questions 7

Which of the following terms refer to existing scan techniques with nmap? (Choose TWO correct answers.)

Options:
A.

Xmas Scan

B.

Zero Scan

C.

FIN Scan

D.

IP Scan

E.

UDP SYN Scan

Questions 8

Which of the following expressions are valid AIDE rules? (Choose TWO correct answers.)

Options:
A.

!/var/run/.*

B.

append: /var/log/*

C.

/usr=all

D.

#/bin/

E.

/etc p+i+u+g

Questions 9

Which of the following practices are important for the security of private keys? (Choose TWO correct answers.)

Options:
A.

Private keys should be created on the systems where they will be used and should never leave them.

B.

private keys should be uploaded to public key servers.

C.

Private keys should be included in X509 certificates.

D.

Private keys should have a sufficient length for the algorithm used for key generation.

E.

Private keys should always be stored as plain text files without any encryption.

Questions 10

Which of the following statements is used in a parameter file for setkey in order to create a new SPD entry?

Options:
A.

spd

B.

addspd

C.

newspd

D.

spdnew

E.

spdadd