Pass the LPI LPIC Level 3 303-200 Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which of the following statements is true about chroot environments?

Options:

A.

Symbolic links to data outside the chroot path are followed, making files and directories accessible


B.

Hard links to files outside the chroot path are not followed, to increase security


C.

The chroot path needs to contain all data required by the programs running in the chroot environment


D.

Programs are not able to set a chroot path by using a function call, they have to use the command chroot


E.

When using the command chroot, the started command is running in its own namespace and cannot communicate with other processes


Expert Solution
Questions # 12:

What happens when the command getfattr afile is run while the file afile has no extended attributes set?

Options:

A.

getfattr prints a warning and exits with a values of 0.


B.

getfattr prints a warning and exits with a value of 1.


C.

No output is produced and getfattr exits with a value of 0.


D.

No outputs is produced and getfattr exits with a value of 1


Expert Solution
Questions # 13:

Which of the following terms refer to existing scan techniques with nmap? (Choose TWO correct answers.)

Options:

A.

Xmas Scan


B.

Zero Scan


C.

FIN Scan


D.

IP Scan


E.

UDP SYN Scan


Expert Solution
Questions # 14:

Which of the following access control models is established by using SELinux?

Options:

A.

Security Access Control (SAC)


B.

Group Access Control (GAC)


C.

User Access Control (UAC)


D.

Discretionary Access Control (DAC)


E.

Mandatory Access Control (MAC)


Expert Solution
Questions # 15:

Which of the following commands defines an audit rule that monitors read and write operations to the file/ etc/firewall/rules and associates the rule with the name firewall?

Options:

A.

auditctl -N firewall –r r: /etc/firewall/rules –r w: etc/firewall/rules


B.

auditctl -A –f /etc/firewall/rules –o r– o w –l firewall


C.

auditctl –w /etc/firewall/rules -p rw -k firewall


D.

auditctl -_read /etc/firewall/rules -_write /etc/firewall/rules --label firewall


E.

echo "n: firewall r:/etc/firewall/rules: w:/ etc/firewall/rules:" | auditctl ~


Expert Solution
Questions # 16:

Which of the following practices are important for the security of private keys? (Choose TWO correct answers.)

Options:

A.

Private keys should be created on the systems where they will be used and should never leave them.


B.

private keys should be uploaded to public key servers.


C.

Private keys should be included in X509 certificates.


D.

Private keys should have a sufficient length for the algorithm used for key generation.


E.

Private keys should always be stored as plain text files without any encryption.


Expert Solution
Questions # 17:

Which of the following lines in an OpenSSL configuration adds an X 509v3 Subject Alternative Name extension for the host names example.org and www.example.org to a certificate'?

Options:

A.

subjectAltName = DNS: www example.org, DNS:example.org


B.

extension= SAN: www.example.org , SAN:example.org


C.

subjectAltName: www.example.org , subjectAltName: example.org


D.

commonName = subjectAltName= www.example.org , subjectAltName = example.org


E.

subject= CN= www.example.org , CN=example.org


Expert Solution
Questions # 18:

Which command is used to run a new shell for a user changing the SELinux context? (Specify ONLY the command without any path or parameters.)


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions