LPI 303-200 practice test

Exam Title: Security

Last update: Dec 10 ,2025
Question 1

Which of the following expressions are valid AIDE rules? (Choose TWO correct answers.)

  • A. !/var/run/.*
  • B. append: /var/log/*
  • C. /usr=all
  • D. #/bin/
  • E. /etc p+i+u+g
Answer:

A, E


vote your answer:
A
B
C
D
E
A 0 B 0 C 0 D 0 E 0
Comments
Question 2

Which of the following commands defines an audit rule that monitors read and write operations to
the file/ etc/firewall/rules and associates the rule with the name firewall?

  • A. auditctl -N firewall –r r: /etc/firewall/rules –r w: etc/firewall/rules
  • B. auditctl -A –f /etc/firewall/rules –o r– o w –l firewall
  • C. auditctl –w /etc/firewall/rules -p rw -k firewall
  • D. auditctl -_read /etc/firewall/rules -_write /etc/firewall/rules --label firewall
  • E. echo "n: firewall r:/etc/firewall/rules: w:/ etc/firewall/rules:" | auditctl ~
Answer:

C


vote your answer:
A
B
C
D
E
A 0 B 0 C 0 D 0 E 0
Comments
Question 3

Which of the following resources of a shell and its child processes can be controlled by the Bash
build-in command ulimit? (Choose THREE correct answers.)

  • A. The maximum size of written files
  • B. The maximum number of open file descriptors
  • C. The maximum number of newly created files
  • D. The maximum number of environment variables
  • E. The maximum number of user processes
Answer:

A, B, E


vote your answer:
A
B
C
D
E
A 0 B 0 C 0 D 0 E 0
Comments
Question 4

Which of the following database names can be used within a Name Service Switch (NSS)
configuration file? (Choose THREE correct answers).

  • A. host
  • B. shadow
  • C. service
  • D. passwd
  • E. group
Answer:

A, C, E


vote your answer:
A
B
C
D
E
A 0 B 0 C 0 D 0 E 0
Comments
Question 5

Which of the following types can be specified within the Linux Audit system? (Choose THREE correct
answers)

  • A. Control rules
  • B. File system rules
  • C. Network connection rules
  • D. Console rules
  • E. System call rules
Answer:

A, B, E


vote your answer:
A
B
C
D
E
A 0 B 0 C 0 D 0 E 0
Comments
Question 6

Which PAM module checks new passwords against dictionary words and enforces complexity?
(Specially the module name only without any path.)

Answer:

pam_cracklib


Explanation:
http;//www-deer-run.com/~hal/sysadmin/pam_cracklib.html

Comments
Question 7

Which command installs and configures a new FreelPA server, including all sub-components, and
creates a new FreelPA domain? (Specially ONLY the command without any path or parameters).

Answer:

ipa-server-
install


Explanation:
https://www.freeipa.org/images/2/2b/lnstallation_and_Deployment.Guidep.pdf

Comments
Question 8

Which of the following sections are allowed within the Kerberos configuration file krb5.conf?
(Choose THREE correct answers.)

  • A. [plugins]
  • C. [domain]
  • D. [capaths]
  • E. [realms]
Answer:

A, D, E


vote your answer:
A
C
D
E
A 0 C 0 D 0 E 0
Comments
Question 9

Which of the following components are part of FreeIPA? (Choose THREE correct answers.)

  • A. DHCP Server
  • B. Kerberos KDC
  • C. Intrusion Detection System
  • D. Public Key Infrastructure
  • E. Directory Server
Answer:

B, D, E


vote your answer:
A
B
C
D
E
A 0 B 0 C 0 D 0 E 0
Comments
Question 10

Which of the following commands disables the automatic password expiry for the user usera?

  • A. chage --maxdays none usera
  • B. chage –maxdays 99 usera
  • C. chage --maxdays -1 usera
  • D. chage --lastday none usera
  • E. chage --lastday 0 usera
Answer:

C


vote your answer:
A
B
C
D
E
A 0 B 0 C 0 D 0 E 0
Comments
Page 1 out of 5
Viewing questions 1-10 out of 60
Go To
page 2