Lpi 303-300 Practice Exams
Last updated on Apr 01,2025- Exam Code: 303-300
- Exam Name: LPIC-3 Security
- Certification Provider: Lpi
- Latest update: Apr 01,2025
Question #1
Which tool can be used to manage the Linux Audit system?
- A . auditd
- B . rkhunter
- C . chkrootkit
- D . maldet
Question #2
Which permission bit allows a file to be executed?
- A . Read
- B . Write
- C . Execute
- D . SetUID
Question #3
What is a Trojan?
- A . A type of virus
- B . A type of malware that disguises itself as legitimate software
- C . A type of denial-of-service attack
- D . A type of phishing scam
Question #4
What is a man-in-the-middle attack?
- A . An attack that targets a specific user or organization
- B . An attack that aims to steal sensitive information
- C . An attack that intercepts communications between two parties to steal information
- D . An attack that floods a network or server with traffic to make it unavailable
Question #5
What is a ciphertext?
- A . The original message before encryption
- B . The encrypted message
- C . The key used to encrypt the message
- D . The algorithm used to encrypt the message
Question #6
What is the purpose of a TLSA record in DANE?
- A . To provide information about a TLS server
- B . To sign a TLS server’s public key
- C . To authenticate a DNS server
- D . To map a domain name to an IP address
Question #7
What is a rootkit?
- A . A type of virus
- B . A type of malware that disguises itself as legitimate software
- C . A type of denial-of-service attack
- D . A type of phishing scam
Question #8
Given a proper network and name resolution setup, which of the following commands establishes a trust between a FreeIPA domain and an Active Directory domain?
- A . ipa trust-add –type ad addom –admin Administrator –password
- B . ipa-ad Cadd-trust –account ADDOMAdministrator–query-password
- C . net ad ipajoin addom CU Administrator -p
- D . trustmanager add C-domain ad: //addom –user Administrator Cw
- E . ipa ad join addom -U Administrator -w
Question #9
What is the purpose of rkhunter?
- A . To manage system log files
- B . To detect rootkits and other security threats
- C . To manage installed packages
- D . To automate host scans
Question #10
Linux Extended File Attributes are organized in namespaces. Which of the following names correspond to existing attribute namespaces?(Choose THREE correct answers.)
- A . default
- B . system
- C . owner
- D . trusted
- E . user