It is more faster and easier to pass the LPI 303-200 exam by using 100% Correct LPI LPIC-3 Exam 303: Security, version 2.0 questuins and answers. Immediate access to the Improve 303-200 Exam and find the same core area 303-200 questions with professionally verified answers, then PASS your exam with a high score now.

Q25. Which of the following database names can be used within a Name Service Switch (NSS) configuration file? (Choose THREE correct answers).

A. host

B. shadow

C. service

D. passwd

E. group

Answer: A, C, E 


Q26. Which of the following prefixes could be present in the output of getcifsacl? (Choose THREE correct answers.)

A. ACL

B. GRANT

C. GROUP

D. OWNER

E. SlD

Answer: A, C, E 


Q27. Which command is used to run a new shell for a user changing the SELinux context? (Specify ONLY the command without any path or parameters.)

Answer: 

newrole

Explanation: https://www.centos.ofg/docs/5/html/DeployrnenLGuide-en-US/sec-sel-admincontrol.html


Q28. Which of the following authentication methods was added to NFS in version 4?

A. Kerberos  authentication

B. SSH hostkey authentication

C. Winbind authentication

D. SSL certificate authentication

Answer: A


Q29. Which of the following authentication methods was added to NFS in version 4?

A. Kerberos  authentication

B. SSH hostkey authentication

C. Winbind authentication

D. SSL certificate authentication

Answer: A


Q30. in which path is the data, which can be altered by the sysctl command, accessible?

A. /dev/sys/

B. /sys/

C. /proc/sys/

D. /sysctl/

Answer:


Q31. Which of the following prefixes could be present in the output of getcifsacl? (Choose THREE correct answers.)

A. ACL

B. GRANT

C. GROUP

D. OWNER

E. SlD

Answer: A, C, E 


Q32. How does TSlG authenticate name servers in order to perform secured zone transfers?

A. Both servers mutually verify their X509 certificates.

B. Both servers use a secret key that is shared between the servers.

C. Both servers verify appropriate DANE records for the labels of the NS records used to delegate the transferred zone.

D. Both servers use DNSSEC to mutually verify that they are authoritative for the transferred zone.

Answer: