LPI 303-200 Exam Questions

Questions for the 303-200 were updated on : Sep 09 ,2024

Page 1 out of 4. Viewing questions 1-15 out of 60

Question 1

Which command revokes ACL-based write access for groups and named users on the file afile?

  • A. setfacI -x group: * : rx, user:*: rx afile
  • B. setfacl -x mask: : rx afile
  • C. setfacl ~m mask: : rx afile
  • D. setfacl ~m group: * : rx, user:*: rx afile
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

Which of the following authentication methods was added to NFS in version 4?

  • A. Kerberos authentication
  • B. SSH hostkey authentication
  • C. Winbind authentication
  • D. SSL certificate authentication
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

Which of the following access control models is established by using SELinux?

  • A. Security Access Control (SAC)
  • B. Group Access Control (GAC)
  • C. User Access Control (UAC)
  • D. Discretionary Access Control (DAC)
  • E. Mandatory Access Control (MAC)
Answer:

E

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 4

Which command is used to run a new shell for a user changing the SELinux context? (Specify ONLY
the command without any path or parameters.)

Answer:

newrole

User Votes:

Explanation:
https://www.centos.ofg/docs/5/html/DeployrnenLGuide-en-US/sec-sel-admincontrol.html

Discussions
vote your answer:
0 / 1000

Question 5

What option of mount.cifs specifies the user that appears as the local owner of the files of a
mounted CIFS share when the server does not provide ownership information? (Specify ONLY the
option name without any values or parameters.)

Answer:

uld=arg

User Votes:

Explanation:
http://linux.die.net/man/8/mount.cifs

Discussions
vote your answer:
0 / 1000

Question 6

What happens when the command getfattr afile is run while the file afile has no extended attributes
set?

  • A. getfattr prints a warning and exits with a values of 0.
  • B. getfattr prints a warning and exits with a value of 1.
  • C. No output is produced and getfattr exits with a value of 0.
  • D. No outputs is produced and getfattr exits with a value of 1
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

How are SELinux permissions related to standard Linux permissions? (Choose TWO correct answers.)

  • A. SELinux permissions overnde standard Linux permissions.
  • B. standard Linux permissions override SELinux permissions.
  • C. SELinux permissions are verified before standard Linux permissions.
  • D. SELinux permissions are verified after standard Linux permissions.
Answer:

B, D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

Which of the following prefixes could be present in the output of getcifsacl? (Choose THREE correct
answers.)

  • A. ACL
  • B. GRANT
  • C. GROUP
  • D. OWNER
  • E. SID
Answer:

A, C, E

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 9

Which of the following are differences between AppArmor and SELinux? (Choose TWO correct
answers).

  • A. AppArmor is implemented in user space only. SELinux is a Linux Kernel Module.
  • B. AppArmor is less complex and easier to configure than SELinux.
  • C. AppArmor neither requires nor allows any specific configuration. SELinux must always be manually configured.
  • D. SELinux stores information in extended file attributes. AppArmor does not maintain file specific information and states.
  • E. The SELinux configuration is loaded at boot time and cannot be changed later on AppArmor provides user space tools to change its behavior.
Answer:

B, D

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 10

Linux Extended File Attributes are organized in namespaces. Which of the following names
correspond to existing attribute namespaces? (Choose THREE correct answers.)

  • A. default
  • B. system
  • C. owner
  • D. trusted
  • E. user
Answer:

B, D, E

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 11

Which of the following expressions are valid AIDE rules? (Choose TWO correct answers.)

  • A. !/var/run/.*
  • B. append: /var/log/*
  • C. /usr=all
  • D. #/bin/
  • E. /etc p+i+u+g
Answer:

A, E

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 12

Which of the following commands defines an audit rule that monitors read and write operations to
the file/ etc/firewall/rules and associates the rule with the name firewall?

  • A. auditctl -N firewall –r r: /etc/firewall/rules –r w: etc/firewall/rules
  • B. auditctl -A –f /etc/firewall/rules –o r– o w –l firewall
  • C. auditctl –w /etc/firewall/rules -p rw -k firewall
  • D. auditctl -_read /etc/firewall/rules -_write /etc/firewall/rules --label firewall
  • E. echo "n: firewall r:/etc/firewall/rules: w:/ etc/firewall/rules:" | auditctl ~
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 13

Which of the following resources of a shell and its child processes can be controlled by the Bash
build-in command ulimit? (Choose THREE correct answers.)

  • A. The maximum size of written files
  • B. The maximum number of open file descriptors
  • C. The maximum number of newly created files
  • D. The maximum number of environment variables
  • E. The maximum number of user processes
Answer:

A, B, E

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 14

Which of the following database names can be used within a Name Service Switch (NSS)
configuration file? (Choose THREE correct answers).

  • A. host
  • B. shadow
  • C. service
  • D. passwd
  • E. group
Answer:

A, C, E

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 15

Which of the following types can be specified within the Linux Audit system? (Choose THREE correct
answers)

  • A. Control rules
  • B. File system rules
  • C. Network connection rules
  • D. Console rules
  • E. System call rules
Answer:

A, B, E

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Discussions
vote your answer:
A
B
C
D
E
0 / 1000
To page 2