LPI Level 3 Exam (LPI 303: Security) : Exam Objectives Version: Version 2.0 Exam Code: 303-200
LPI Level 3 Exam (LPI 303: Security) : Exam Objectives Version: Version 2.0 Exam Code: 303-200
QUESTION 1
In apache configuration which directives are used to restrict access based on host/domain name
and IP address?
QUESTION 2
Someone who whises to receive and encrypted file has provided a key UID and a key fingerprint for
verification to the data sender.
Assuming that this key is on a public keyserver, what command will fetch the public key from the
server ?
QUESTION 3
Linux Extended Attributes include attributes classes.
A. default
B. system
C. owner
D. trusted
E. user
QUESTION 4
Which of the following is NOT and valid scan technique with nmap ?
A. Window
B. SYN
C. ACK
D. Connect()
E. RST
QUESTION 5
Which of the following are common techniques for securing a sendmail server ?
QUESTION 6
What does the following iptables rule accomplish:
A. Drops all packets from the LAN destined for port 111.
B. Drops all packets originating from the local machine unless they are destined for port 111.
C. Drops all packets destined for port 111 which originate from the local machine.
D. Drops all packets destined for port 111 unless they are from the local machine.
QUESTION 7
What is the purpose of tripwire?
QUESTION 8
You wish to revoke write access for all groups and named users on a file.
QUESTION 9
Which of the following are common techniques for securing Nagios ?
QUESTION 10
Which GPG command us used to create a revocation certificate in case a GPG key ever needs to be
called?
A. PasswordAuthentication
B. HostKey
C. PrivatekeyAuthentication
D. Serverkey
QUESTION 12
Which statements are true of the following Wireshark capture filter:
(tcp[2:2] > 1500 and tcp[2:2] < 1550) or (tcp[4:2] > 1500 and tcp[4:2] < 1550)
QUESTION 13
Which of the following statements are advantages that Mandatory Access Control has over
Discretionary Access Control models?
QUESTION 14
Which of the following are valid OpenVPN authentications modes?
A. S/Key
B. Kerberos
C. Static Key
D. Password
E. TLS
QUESTION 15
Which of the following is NOT included in a Snort rule headers?
A. Protocol
B. Action
C. Source IP address
D. Packet byte offset
E. Source port
QUESTION 16
Which of the following export options, when specified in /etc/exports, will tell the server to use the
NFSv4 Pseudofilesystem?
A. fsid=2
B. fsid=0
C. fsid=3
D. fsid=1
QUESTION 17
In the Puppet centralized configuration management tool, a manifest is:
QUESTION 18
Which syslog configuration line will send out logged messages to a remote syslog server?
A. *.* host:remotehost
B. *.* remote remotehost
C. *.* @remotehost
D. *.* host=remotehost
QUESTION 19
Which of the following are valid NFSv4 security types?
A. RSA
B. SSL
C. SPKM
D. Kerberos
E. LIPKEY
QUESTION 20
An administrator has created a mapping with the following command:
He hat set 3 different keys. Which command below will delete the first key?
QUESTION 21
What is the purpose of snort inline?
QUESTION 22
Which LUKS action, when supplied to the cryptsetup command, will initialize a LUKS partition and
set the initial key?
A. luksFormat
B. luksUnformat
C. FormatLuks
D. UnformatLuks
QUESTION 23
What command is used to create and maintain a Basic Authentification password file for apache?
A. htpasswd
B. htpassworld
C. htpsw
D. passwdht
QUESTION 24
You are certain that your kernel has been compiled with ACL support, however, when you try to set
an ACL on a file, you get the following output:
QUESTION 25
SELinux has just been installed on a Linux system and the administrator wants to use SELinux in
permissive in order to audit the various service on the system.
A. setenforce 0
B. /etc/init.d/selinux stop
C. selinux passive
D. /etc/init.d/selinux startpassive
QUESTION 26
How does AppArmor configure its access control settings?
QUESTION 27
The system administrator wishes tu use John the Ripper to confirm that the passwords in a file
called passwords are not weak.
John has finished but the terminal window running the program has closed.
What command can be used to list any cracked passwords for this file?
QUESTION 28
What OpenSSL command will generate a selfsigned test certificate?
QUESTION 29
What is the default UDP port for OpenVPN traffic?
A. 1194
B. 8080
C. 21
D. 1564
QUESTION 30
DNS servers are vulnerable to which of the following attacks?
A. Cache Poisoning
B. Fork Bomb Attack
C. PasswordBased Attack
D. ManintheMiddle
E. Smurf Attack
QUESTION 31
What does ntop use for data collection?
A. Network packets
B. Log files
C. Frame relay
D. SNMP
QUESTION 32
Postfix daemons can be chroot'd by setting the chroot flag in _________________.
A. master.cf
B. master.fc
C. master.tw
D. master.gz
QUESTION 33
In Nessus, what does the acronym NASL stand for?
QUESTION 34
What does the following iptables rule accomplish:
QUESTION 35
Which of the following methods can be used to deactivate a rule in Snort?
QUESTION 36
Which of the following lines in the OpenVPN server.conf file will supply a DNS server for DHCP
clients to use?
QUESTION 37
What is an SO rule in the context of Snort?
A. A loadable snort module
B. A rule which can be written in the Perl programming language
C. A simple object
D. A snort overflow
QUESTION 38
Which of the following are valid Nagios objects?
A. Contacts
B. Commands
C. Host Groups
D. Notification Groups
E. Programs
QUESTION 39
The command 'nmap sS O 10.142.232.10' produces the following output:
QUESTION 40
Which OpenSSL command is used to inspect the information stored in a certificate?
A. x509
B. show
C. info
D. req
QUESTION 41
Which of the following commands will create a new, signed tw.pol file?
QUESTION 42
By default, when verifying a signed file or a file with a detached signature, which keyring is used to
search for a public keys?
A. ~/.gnupg/trustdb.gpg
B. ~/.gnupg/secring.gpg
C. ~/.gnupg/trustedkeys.gpg
D. ~/.gnupg/pubring.gpg
QUESTION 43
What does the following iptables rule accomplish:
A. Accepts traffic on port 22 only from the host 208.77.188.166 and 10.142.232.1
B. Forwards all requests from the host 10.142.232.1 on port 22 the internal host 208.77.188.166
C. Forwards all requests from the host 208.77.188.166 on port 22 the internal host 10.142.232.1
D. Drops traffic on port 22 only from the host 208.77.188.166 and 10.142.232.1
QUESTION 44
Which utility is used for retrieving, setting, and removing NFSv4 ACLs?
A. nfs4acl or /usr/sbin/nfs4acl
Exam B
QUESTION 1
Which PAM module checks new passwords against dictionary words and enforces complexity?
A. pam_cracklib
QUESTION 2
Which command installs and configures a new FreeIPA server, including all sub-components, and
creates a new FreeIPA domain?
A. ipa-server-install
QUESTION 3
Which of the following sections are allowed within the Kerberos configuration file krb5.conf?
A. [plugins]
B. [crypto]
C. [domain]
D. [capaths]
E. [realms]
QUESTION 4
Which of the following components are part of FreeIPA?
A. DHCP Server
B. Kerberos KDC
C. Intrusion Detection System
D. Public Key Infrastructure
E. Directory Server
QUESTION 5
Which of the following commands disables the automatic password expiry for the user usera?
QUESTION 6
Given a proper network and name resolution setup, which of the following commands establishes a
trust between a FreeIPA domain and an Active Directory domain?
QUESTION 7
In which path is the data, which can be altered by the sysctl command, accessible?
A. /dev/sys/
B. /sys/
C. /proc/sys/
D. /sysctl/
QUESTION 8
Which of the following statements is true about chroot environments?
A. Symbolic links to data outside the chroot path are followed, making files and directories accessible.
B. Hard links to files outside the chroot path are not followed, to increase security.
C. The chroot path needs to contain all data required by the programs running in the chroot environment.
D. Programs are not able to set a chroot path by using a function call, they have to use the command
chroot.
E. When using the command chroot, the started command is running in its own namespace and cannot
communicate with other processes.
QUESTION 9
Which of the following commands adds a new user usera to FreeIPA?
QUESTION 10
Which command included in the Linux Audit system provides searching and filtering of the audit
log?
A. ausearch
QUESTION 11
Which of the following commands adds users using SSSD's local service?
A. sss_adduser
B. sss_useradd
C. sss_add
D. sss-addlocaluser
E. sss_local_adduser
QUESTION 12
Which of the following DNS record types can the command dnssec-signzone add to a zone?
Choose THREE correct answers.
A. ASIG
B. NSEC
C. NSEC3
D. NSSIG
E. RRSIG
QUESTION 13
What effect does the configuration SSLStrictSNIVHostCheck on have on an Apache HTTPD virtual
host?
A. The clients connecting to the virtual host must provide a client certificate that was issued by the same
CA that issued the server's certificate.
B. The virtual host is served only to clients that support SNI.
C. All of the names of the virtual host must be within the same DNS zone.
D. The virtual host is used as a fallback default for all clients that do not support SNI.
E. Despite its configuration, the virtual host is served only on the common name and Subject Alternative
Names of the server certificates.
QUESTION 14
How does TSIG authenticate name servers in order to perform secured zone transfers?
QUESTION 15
Which of the following statements are true regarding the certificate of a Root CA?
A. It is a self-signed certificate.
B. It does not include the private key of the CA.
C. It must contain a host name as the common name.
D. It has an infinite lifetime and never expires.
E. It must contain an X509v3 Authority extension.
QUESTION 16
Which of the following parameters to openssl s_client specifies the host name to use for TLS
Server Name Indication?
A. -tlsname
B. -servername
C. -sniname
D. -vhost
E. -host
QUESTION 17
An X509 certificate contains the following information:
QUESTION 18
A LUKS device was mapped using the command:
Given that this device has three different keys, which of the following commands deletes only the
first key?
QUESTION 19
Which of the following lines in an OpenSSL configuration adds an X 509v3 Subject Alternative
Name extension for the host names example.org and www.example.org to a certificate?
QUESTION 20
Which option in an Apache HTTPD configuration file enables OCSP stapling?
A. httpd-ssl.conf
QUESTION 21
Which of the following statements is true regarding eCryptfs?
A. For every file in an eCryptfs directory there exists a corresponding file that contains the encrypted
content.
B. The content of all files in an eCryptfs directory is stored in an archive file similar to a tar file with an
additional index to improve performance.
C. After unmounting an eCryptfs directory, the directory hierarchy and the original file names are still
visible, although, it is not possible to view the contents of the files.
D. When a user changes his login password, the contents of his eCryptfs home directory has to be re-
encrypted using his new login password.
E. eCryptfs cannot be used to encrypt only directories that are the home directory of a regular Linux user.
QUESTION 22
Which of the following keywords are built-in chairs for the iptables nat table? (Choose THREE
correct answers.)
A. OUTPUT
B. MASQUERADE
C. PROCESSING
D. POSTROUTING
E. PREROUTING
QUESTION 23
Which of the following methods can be used to deactivate a rule in Snort?
QUESTION 24
What is the purpose of IP sets?
A. They group together IP addresses that are assigned to the same network interfaces.
B. They group together IP addresses and networks that can be referenced by the network routing table.
C. They group together IP addresses that can be referenced by netfilter rules.
D. They group together IP and MAC addresses used by the neighbors on the local network.
E. They group together IP addresses and user names that can be referenced from /etc/hosts.allow and /
etc/hosts.deny
QUESTION 25
Which of the following statements describes the purpose of ndpmon?
A. It monitors the network for neighbor discovery messages from new IPv6 hosts and routers.
B. It monitors remote hosts by periodically sending echo requests to them.
C. It monitors the availability of a network link by querying network interfaces.
D. It monitors the network for IPv4 nodes that have not yet migrated to IPv6.
E. It monitors log files for failed login attempts in order to block traffic from offending network nodes.
QUESTION 26
Which of the following terms refer to existing scan techniques with nmap?
A. Xmas Scan
B. Zero Scan
C. FIN Scan
D. IP Scan
E. UDP SYN Scan
QUESTION 27
Which directive is used in an OpenVPN server configuration in order to send network configuration
information to the client?
A. push
QUESTION 28
Which of the following statements are valid wireshark capture filters?
QUESTION 29
Which option of the openvpn command should be used to ensure that ephemeral keys are not
written to the swap space?
A. --mlock
B. --no-swap
C. --root-swap
D. --keys-no-swap
QUESTION 30
When a user logs into a system using SSH, what is the format of SELinux security context which
will assign the user_r role and the user_t domain to their login session?
A. user_r:user_t system_r:sshd_t
B. sshd_t:system_r user_t:user_r
C. system_r:sshd_t user_r:user_t
D. user_t:user_r sshd_t:system_r
QUESTION 31
A user that is allowed to use the su command under SELinux is also allowed to switch from the
user role to the sysadmin role.
What command will run a new shell for the user in the new context?
A. newrole
B. badrole
C. oldrole
D. arole
QUESTION 32
What does the following iptables rule accomplish:
QUESTION 33
How are SELinux permissions related to standart Linux permissions?
QUESTION 34
A user is attempting to connect to a remote host via SSH and following message is displayed:
QUESTION 35
SELinux is a Linux feature that:
A. monitors system file access by unprivileged users and warns them they are trying to gain access to files
beyonf their permission levels set in the Mandatory Access Control policies.
B. provides only Mandatory Access Control policies. Additional access control models such as Rolebased
access control require additional tools to implement.
C. enforces Mandatory Access Control policies that can restrict user space programs and system servers
to the minimum amount of privileges required to operate correctly.
D. ensure that system files referenced in the Mandatory Access Control policies are not modified and alerts
administrators when changes occur.
QUESTION 36
Which of the following rule directives will email [email protected] and [email protected] when
the Mail Configuration rule is violated?
A. (
rulename = "Mail Configuration",
severity = $(SIG_HI),
emailto = [email protected],
emailto = [email protected]
)
B. (
rulename = "Mail Configuration",
severity = $(SIG_HI),
emailto = [email protected],[email protected]
)
C. (
rulename = "Mail Configuration",
severity = $(SIG_HI),
emailto = [email protected];[email protected]
)
D. (
rulename = "Mail Configuration",
severity = $(SIG_HI),
emailto = [email protected],
emailcc = [email protected]
)
QUESTION 37
Specifying the _____________ parameter in sshd_config will allow the administrator to
systematically provide access to certain user accounts by name.
A. AllowUsers
B. AddUsers
C. DenyUsers
D. BlockUsers
QUESTION 38
Which command will list all of the extended attributes on the file afile.txt with the values?
QUESTION 39
A user is attempting to connect to a remote server via SSH and receives the following message:
A. The RSA key fingerprint was found in the SpamCop database, indicating that the remote host is a
known spammer.
B. The user's SSH client was unable to connect to the remote host's authentication agent for verification.
C. The user's SSH client is incompatible with the server's RSA key.
D. The server's SSH host key cannot be found in the list of known hosts.
QUESTION 40
Which command is used to add an additional name, email address and comment to an existing
private key?
QUESTION 41
An administrator has just configured vsftp and notice that she cannot follow symbolic links when
connected to the FTP server.
QUESTION 42
What can proxymap be used for in a Postfix installation?
QUESTION 43
Which directive must be set to 0 in a host or service definition to prevent Nagios from sending more
than one alert for a particular event?
A. notification_interval
B. notification_alternal
C. interval_notification
D. alterval_notification
QUESTION 44
Which of the following are builtin chains for the iptables nat table?
A. OUTPUT
B. INPUT
C. PROCESSING
D. POSTROUTING
E. PREROUTING
Exam C
QUESTION 1
Which GPG command is used to sign a public key?
QUESTION 2
Which command will set the user.author attribute on the file afile.txt?
QUESTION 3
There is a configuration file being managed by RCS.
Base on timestamps, it appears that someone has modified the file without checking it into RCS.
What command can be used to compare the configuration file with the latest committed version?
A. rcsdiff
QUESTION 4
An administrator is capturing traffic with Wireshark and is only seeing ARP traffic.
A. The network interface on which the scan is running is not promiscuous mode.
B. The mschine is on a switched network and is therefore only seeing local and braodcast/multicast
packets.
C. The administrator did not enable the TCP and UDP option when starting the scan.
D. The network interface on which the scan is running has the ARP_ONLY flag set.
QUESTION 5
An SELinux security context is required to ensure that all files in /opt have the default context of
system_u:object_r:usr_t.
A. system_u:object_r:usr_t /opt/*
B. /opt/.* system_u:object_r:usr_t
C. /opt/* system_u:object_r:usr_t
D. system_u:object_r:usr_t: /opt/.*
E. system_u:object_r:usr_t /opt/.*
QUESTION 6
On a new Linux system, the root user is being asked to provide the root user password before
being able to use the su command.
What line in the /etc/ pam.d/su file will allow root to use su without supplying passwords?
QUESTION 7
What OpenSSL command will generate a certificate signing request (CSR) using the private key file
privkey.pem?
QUESTION 8
Which of the following can be done to secure BIND server?
QUESTION 9
The apache administrator has added the following lines to the configuration files:
<Directory />
AllowOverride None
</Directory>
A. It stops users fro serving HTML files from their home directories.
B. It prevents HTML files from being served out of the / directory.
C. It stops users from setting up .htaccess files unless specifically allowed in additional configuration.
D. It prevents CGI scripts from modifiying apache features dynamically.
QUESTION 10
Where is the global list of known SSH host keys located ?
A. /etc/ssh/sshd_known_hosts
QUESTION 11
What command will list basic information about all targets avaiable to cryptmount?
QUESTION 12
What are the steps which must be followed to enable serverwide zone transfers between two BIND
9 servers securely using TSIG?
A. Generate a key, specify the public key in the named configuration on both servers, create a server
statement in the name configuration on both servers.
B. Generate a key, specify the private key in the named configuration on both servers, create a server
statement in the named configuration on both servers.
C. Generate a key, specify the private key in the named configuration on one server and the public key in
the named configuration on the other, create a remote statement in the named configuration on both
servers.
D. Generate a key, specify the private key in the named configuration on one server and the public key in
the named configuration on the other, create a server statement in the named configuration in both
servers.
QUESTION 13
An administrator has successfully configured a cryptographic volume for dmcrypt, and added the
following line to /etc/fstab:
Upon booting the system, the error message "mount: special device /dev/mapper/cryptvol does not
exist" is displayed.
A. /etc/crypttab
QUESTION 14
Which of the following are valid deployment scenarios?
A. Public Site
B. Switched Gateway
C. Simple Host
D. Border Gateway
E. Mirror Line
QUESTION 15
What is one of the primary claimed benefits of Smack over SELinux?
A. Smack implement Rule Set Based Access Control. SELinux doesn't support this model.
B. SELinux has export restictions placed on it by the NSA.
C. Configuration of Smack is much more simple.
D. Smack allows users to share files without administrator intervention.
QUESTION 16
What OpenSSL command will generate a private RSA key of 2048 bits and no passphrase?
QUESTION 17
An administrator has just configured an OpenVPN client. Upon starting the service, the following
message is displayed:
A. The client was unable to establish a network connection with the server.
B. The client was able to establish a network connection wit the server, however TLS key negotiation
failed, resulting in a fallback to SSL.
C. The client was able to establish a network connection with the server, however TLS and SSL security
are not enabled.
D. The client was able to establish a network connection with the server, however TSL key negotiation took
longer than 60 seconds, indicating that there may be a problem with network performance.
QUESTION 18
Under which path is the SELinux pseudofilesystem found ?
A. /dev/selinux
B. /sys/delinux
C. /selinux
D. /var/selinux
E. /proc/selinux
QUESTION 19
Which option is required to syslogd in order for it to accept remote log message?
A. s
B. r
C. remote
D. l
QUESTION 20
Which of the following statements are true about Linux Extended Attributes on files?
QUESTION 22
An unprivileged user issued a command which produced the following log message:
A. User hugh was not running in a security context that permitted reading the file.
B. User hugh only needs to switch to the object_r role in order to edit /etc/shadow.
C. The security context fur hugh is misconfigured and needs access to read any system file.
D. User hugh was not running in a security context that permitted writing to the file.
QUESTION 23
The local system administrator has created a configuration entry for apache version 2 that isn't
working.
<Location /members>
AuthName Members
AuthType Basic
AuthUserFile /www/passwd
</Location>
QUESTION 24
When adding additional users to a file's extended ACL's, what is true abount the default behaviour
of the ACL mask for the file?
A. The mask is modified to be run union of all permissions of the file owner, owning group and all named
user and groups.
B. The mask is left unchanged.
C. if required, a warning is printed indicating that the mask is too restrictive for the permission being
granted.
D. The mask is modified to be the union of all permissions of the owning group and all named users and
groups.
QUESTION 25
The system administrator is keeping local configuration file changes in RCS.
What command will commit the file RCS revision control AND keep a local, unlocked copy of the
latest version of the file?
A. ci file
B. rcs commit file
C. rcs o file
D. ci u file
QUESTION 26
What is the syntax error in the following simple Puppet configuration file?
class test_class {
file { "/tmp/test.txt":
mode => 600,
owner => root,
group => root
}
}
# Define the node
node testclient {
isa test_class
}
QUESTION 27
Which of the following statements is true when querying the extended attributes of a file that has no
extended attributes set?
QUESTION 28
What is true about the permissions for the file afile give the following output from getfacl?
% getfacl afile
# file: afile
# owner: matt
# group: support
user:: rwx
user:hugh:rw
group::r
group:staff:rx
mask::rwx
other::r
A. Anyone in the support group will be able to read and execute the file.
B. The user hugh will be able to read the contents of the file.
C. Anyone in the users group will be able to read the file.
D. The user matt will not be able to edit this file.
E. Anyone in the staff group will be able to read and execute the file.
QUESTION 29
You have downloaded a file named file.tgz along with a signature file named file.tgz.asc.
Which command can be used to verify that file.tgz hat not beeing tampered with since the file
creator created the signature?
Assume that you have already retrieved the public key of the file creator.
QUESTION 30
What command will remove the dmcrypt mapping named cryptvol?
QUESTION 31
In which of the following scenarios MUST an administrator use ethernet bridging instead of routing
when configuring an OpenVPN site?
A. Some OpenVPN clients will be installed on laptops and must be able to connect from different locations.
B. NetBIOS traffic must be able to traverse the VPN without implementing a WINS server.
C. The IPv4 protocol is required.
D. It will be necessary to use an MTU setting other than the default.
E. The IPX protocol is required.
QUESTION 32
Which GPG command will publish a public key to a public key server?
QUESTION 33
Which of the following are valid dmcrypt modes?
A. XTS
B. ESSIV
C. GMR
D. KWG
E. LRW
Correct Answer: ABE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 34
The OpenSSL command can be used to test connections with various secure services.
What command will open a connection with a remote POP3S (POP3 over SSL) server?
QUESTION 35
The system administartor wishes to use the pam_listfile.so module to restrict which user are
allowed to login via SSH.
QUESTION 36
Which parameter in vsftp.conf will restrict users to their home directory?
A. chroot_local_user
QUESTION 37
What is true about the permissions for the file afile give the following output from getfacl?
% getfacl afile
# file: afile
# owner: matt
# group: support
user:: rwx
user:hugh:rw
group::r
group:staff:rx
mask::rwx
other::r
A. Anyone in the support group will be able to read and execute the file.
B. The user hugh will be able to read the contents of the file.
C. Anyone in the users group will be able to read the file.
D. The user matt will not be able to edit this file.
E. Anyone in the staff group will be able to read and execute the file.
QUESTION 38
Which of the following is NOT and valid scan technique with nmap ?
A. Window
B. SYN
C. ACK
D. Connect()
E. RST
QUESTION 39
You wish to revoke write access for all groups and named users on a file.
QUESTION 40
With SELinux, what is the command that is used for changing the context of a file?
QUESTION 41
Postfix daemons can be chroot'd by setting the chroot flag in _________________.
A. master.cf
QUESTION 42
What is an SO rule in the context of Snort?
QUESTION 43
When adding additional users to a file's extended ACL's, what is true abount the default behaviour
of the ACL mask for the file?
A. The mask is modified to be run union of all permissions of the file owner, owning group and all named
user and groups.
B. The mask is left unchanged.
C. if required, a warning is printed indicating that the mask is too restrictive for the permission being
granted.
D. The mask is modified to be the union of all permissions of the owning group and all named users and
groups.
QUESTION 44
What is the difference between an SELinux domain an an SELinux type ?