Download Security.303-200.PrepAway.2018-10-11.34q.vcex

Vendor: LPI
Exam Code: 303-200
Exam Name: Security
Date: Oct 11, 2018
File Size: 22 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
What happens when the command getfattr afile is run while the file afile has no extended attributes set? 
  1. getfattr prints a warning and exits with a values of 0.
  2. getfattr prints a warning and exits with a value of 1.
  3. No output is produced and getfattr exits with a value of 0.
  4. No outputs is produced and getfattr exits with a value of 1.
Correct answer: C
Question 2
How are SELinux permissions related to standard Linux permissions? (Choose TWO correct answers.)
  1. SELinux permissions override standard Linux permissions.
  2. Standard Linux permissions override SELinux permissions.
  3. SELinux permissions are verified before standard Linux permissions.
  4. SELinux permissions are verified after standard Linux permissions.
Correct answer: BD
Explanation:
http://www.linuxtopia.org/online_books/getting_started_with_SELinux/SELinux_overview.html
http://www.linuxtopia.org/online_books/getting_started_with_SELinux/SELinux_overview.html
Question 3
Which of the following prefixes could be present in the output of getcifsacl? (Choose THREE correct answers.)
  1. ACL
  2. GRANT
  3. GROUP
  4. OWNER
  5. SID
Correct answer: ACE
Explanation:
https://www.mankier.com/1/getcifsacl
https://www.mankier.com/1/getcifsacl
Question 4
Which of the following are differences between AppArmor and SELinux? (Choose TWO correct answers).
  1. AppArmor is implemented in user space only. SELinux is a Linux Kernel Module.
  2. AppArmor is less complex and easier to configure than SELinux.
  3. AppArmor neither requires nor allows any specific configuration. SELinux must always be manually configured.
  4. SELinux stores information in extended file attributes. AppArmor does not maintain file specific information and states.
  5. The SELinux configuration is loaded at boot time and cannot be changed later on. AppArmor provides user space tools to change its behavior.
Correct answer: BD
Explanation:
http://elinux.org/images/3/39/SecureOS_nakamura.pdf
http://elinux.org/images/3/39/SecureOS_nakamura.pdf
Question 5
Linux Extended File Attributes are organized in namespaces. Which of the following names correspond to existing attribute namespaces? (Choose THREE correct answers.)
  1. default
  2. system
  3. owner 
  4. trusted
  5. user
Correct answer: BDE
Explanation:
https://en.wikipedia.org/wiki/Extended_file_attributes
https://en.wikipedia.org/wiki/Extended_file_attributes
Question 6
Which of the following commands defines an audit rule that monitors read and write operations to the file/ etc/firewall/rules and associates the rule with the name firewall?
  1. auditctl -N firewall –r r: /etc/firewall/rules –r w: 
        etc/firewall/rules
  2. auditctl -A –f /etc/firewall/rules –o r –o w –l firewall
  3. auditctl –w /etc/firewall/rules –p rw –k firewall
  4. auditctl –-read /etc/firewall/rules –-write /etc/firewall/rules 
        --label firewall
  5. echo “n: firewall  r:/etc/firewall/rules: w:/ 
        etc/firewall/rules:“ | auditctl ~
Correct answer: C
Explanation:
https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/sec-Defining_Audit_Rules_and_Controls.html
https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/sec-Defining_Audit_Rules_and_Controls.html
Question 7
Which of the following resources of a shell and its child processes can be controlled by the Bash build-in command ulimit? (Choose THREE correct answers.) 
  1. The maximum size of written files
  2. The maximum number of open file descriptors
  3. The maximum number of newly created files
  4. The maximum number of environment variables
  5. The maximum number of user processes
Correct answer: ABE
Explanation:
http://ss64.com/bash/ulimit.html
http://ss64.com/bash/ulimit.html
Question 8
Which of the following database names can be used within a Name Service Switch (NSS) configuration file? (Choose THREE correct answers).
  1. host
  2. shadow
  3. service
  4. passwd
  5. group
Correct answer: ACE
Explanation:
https://docs.oracle.com/cd/E26502_01/html/E29002/a12swit-89620.html#a12swit-84565
https://docs.oracle.com/cd/E26502_01/html/E29002/a12swit-89620.html#a12swit-84565
Question 9
Which command installs and configures a new FreeIPA server, including all sub-components, and creates a new FreeIPA domain? (Specially ONLY the command without any path or parameters).
  1. ipa-server-install
Correct answer: 1
Explanation:
https://www.freeipa.org/images/2/2b/Installation_and_Deployment_Guide.pdf
https://www.freeipa.org/images/2/2b/Installation_and_Deployment_Guide.pdf
Question 10
Which of the following sections are allowed within the Kerberos configuration file krb5.conf? (Choose THREE correct answers.)
  1. [plugins]
  2. [crypto]
  3. [domain]
  4. [capaths]
  5. [realms]
Correct answer: ADE
Explanation:
http://linux.die.net/man/5/krb5.conf
http://linux.die.net/man/5/krb5.conf
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!