Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > LPI > LPIC Level 3 > 303-200

303-200 303-200: LPIC-3 Exam 303: Security, version 2.0 Question and Answers

Question # 4

Which of the following statements describes the purpose of ndpmon?

A.

it monitors the network for neighbor discovery messages from new IPv6 hosts and routers

B.

it monitors remote hosts by periodically sending echo requests to them.

C.

it monitors the availability of a network link by querying network interfaces.

D.

It monitors the network for IPv4 nodes that have not yet migrated to IPv6.

E.

It monitors log files for failed login attempts in order to block traffic from offending network nodes

Full Access
Question # 5

Which of the following methods can be used to deactivate a rule in Snort? (Choose TWO correct answers.)

A.

By placing a # in front of the rule and restarting Snort

B.

By placing a pass rule in local.rules and restarting Snort.

C.

By deleting the rule and waiting for Snort to reload its rules files automatically.

D.

By adding a pass rule to /etc/snort/rules.deactivated and waiting for Snort to reload its rules files automatically.

Full Access
Question # 6

Which of the following command lines sets the administrator password for ntop to testing 123?

A.

ntop --set-admin-password=testing123

B.

ntop --set-password-testing123

C.

ntop --reset-password=testing 123

D.

ntop --set-new-password=testing123

Full Access
Question # 7

Which of the following statements is true regarding eCryptfs?

A.

For every file in an eCryptfs directory there exists a corresponding file that contains the encrypted content.

B.

The content of all files in an eCryptfs directory is stored in an archive file similar to a tar file with an additional index to improve performance.

C.

After unmounting an eCryptfs directory, the directory hierarchy and the original file names are still visible, although, it is not possible to view the contents of the files.

D.

When a user changes his login password, the contents of his eCryptfs home directory has to be re-encrypted using his new login password.

E.

eCryptfs cannot be used to encrypt only directories that are the home directory of a regular Linux user.

Full Access
Question # 8

What option of mount.cifs specifies the user that appears as the local owner of the files of a mounted CIFS share when the server does not provide ownership information? (Specify ONLY the option name without any values or parameters.)

Full Access
Question # 9

Which directive is used in an OpenVPN server configuration in order to send network configuration information to the client? (Specify ONLY the option name without any values or parameters.)

Full Access