LPI 300-300 Exam (page: 1)
LPI C-3: Mixed Environments - 300 - version 3.0
Updated on: 12-Feb-2026

Viewing Page 1 of 12

Which of the following statements is true about raw printing with Samba?

  1. Print jobs are submitted as vector files, including font files, which are rendered and printed by Samba.
  2. Printing jobs are always submitted to Samba in raw postscript.
  3. Any printed file, e.g. an office document, is submitted to the printer without any further processing in exactly the same bit sequence as it is stored on disk.
  4. Samba converts printer-specific jobs to raw data to make them printable on an arbitrary printer.
  5. Printing jobs are rendered on the client and passed on to the printer by Samba.

Answer(s): E

Explanation:

Client-Side Rendering: In Samba, raw printing means that the client machine renders the print job, which includes converting it to a printer-ready format. Transmission to Printer: This rendered print job is then sent to the Samba server without further processing or alteration. Samba acts merely as a pass-through, sending the job directly to the printer. Advantages: This method offloads the rendering process from the server to the client, which can be beneficial in environments with diverse printer types and models, reducing the processing load on the server.
Conclusion: Thus, the correct answer is that printing jobs are rendered on the client and passed on to the printer by Samba.


Reference:

Samba Printing Documentation



The configuration of a Samba share contains the following line:
force directory mode = 0555
If a client creates a new directory with the permissions 0750, which permissions will the resulting directory have in the Samba server's file system?

  1. 0755
  2. 0750
  3. 0750
  4. 0555
  5. 0777

Answer(s): D

Explanation:

force directory mode = 0555: This setting in Samba forces the permissions of any newly created directories to be 0555 regardless of what the client requests. Client Request: If a client creates a directory with permissions 0750, Samba will override this and set the directory's permissions to 0555.
Permissions Breakdown:
0: No permissions for owner.
5: Read and execute permissions for the group.
5: Read and execute permissions for others.
Enforcement: Samba applies this mode strictly to ensure consistency and security as defined by the administrator.


Reference:

Samba Force Directory Mode Documentation



Which of the following smb.conf options turns a regular file share into a DFS share?

  1. msdfs root = yes
  2. addfs support = yes
  3. dfs forward = yes
  4. follow symlinks = yes
  5. proxy share = yes

Answer(s): A

Explanation:

DFS (Distributed File System): This allows for the organization of shared files on multiple servers in a distributed file system.
msdfs root = yes: This option in the Samba configuration file (smb.conf) enables a share to be a DFS root. This means the share can provide access to multiple other shares possibly located on different servers, creating a single point of access.
Functionality: When enabled, users accessing this DFS root can be redirected transparently to the actual location of the shared files, which might be spread across different servers. Setup: To configure a DFS root, add msdfs root = yes to the specific share definition in smb.conf.


Reference:

Samba DFS Configuration



FILL BLANK
What option in sms.conf defines where the data of a file share is stored? (Specify ONLY the option name without any values.)

  1. path

Answer(s): A

Explanation:

path Option: This parameter in smb.conf specifies the directory on the server where the shared data is stored.
Usage: Within a share definition, the path option points to the actual location on the filesystem that Samba will share.
Example Configuration:
[example_share] path = /srv/samba/share
Importance: Defining the correct path is crucial for ensuring that the share points to the intended directory with the appropriate data and permissions.


Reference:

Samba smb.conf man page



Which parameter within a share definition in the Samba configuration makes Samba only show files and directories on a file share which a user can access?

  1. hide unreadable = yes
  2. valid files = read,write
  3. browse mask = 000
  4. browseable = readable
  5. display mode = 100

Answer(s): A

Explanation:

hide unreadable: This smb.conf option ensures that only files and directories that the user has permissions to access are visible in the file share. Functionality: When set to yes, files and directories that the user cannot read (due to permissions) will be hidden from their view.
Security and Usability: This helps in enhancing both security and usability by preventing users from seeing files they cannot access, reducing clutter and potential confusion.
Example Configuration:
[example_share] hide unreadable = yes


Reference:

Samba smb.conf Documentation



Viewing Page 1 of 12



Share your comments for LPI 300-300 exam with other users:

Curtis Nakawaki 6/29/2023 9:13:00 PM

a good contemporary exam review
UNITED STATES


x-men 5/23/2023 1:02:00 AM

q23, its an array, isnt it? starts with [ and end with ]. its an array of objects, not object.
UNITED STATES


abuti 7/21/2023 6:24:00 PM

cool very helpfull
Anonymous


Krishneel 3/17/2023 10:34:00 AM

i just passed. this exam dumps is the same one from prepaway and examcollection. it has all the real test questions.
INDIA


Regor 12/4/2023 2:01:00 PM

is this a valid prince2 practitioner dumps?
UNITED KINGDOM


asl 9/14/2023 3:59:00 PM

all are relatable questions
CANADA


Siyya 1/19/2024 8:30:00 PM

might help me to prepare for the exam
Anonymous


Ted 6/21/2023 11:11:00 PM

just paid and downlaod the 2 exams using the 50% sale discount. so far i was able to download the pdf and the test engine. all looks good.
GERMANY


Paul K 11/27/2023 2:28:00 AM

i think it should be a,c. option d goes against the principle of building anything custom unless there are no work arounds available
INDIA


ph 6/16/2023 12:41:00 AM

very legible
Anonymous


sephs2001 7/31/2023 10:42:00 PM

is this exam accurate or helpful?
Anonymous


ash 7/11/2023 3:00:00 AM

please upload dump, i have exam in 2 days
INDIA


Sneha 8/17/2023 6:29:00 PM

this is useful
CANADA


sachin 12/27/2023 2:45:00 PM

question 232 answer should be perimeter not netowrk layer. wrong answer selected
Anonymous


tomAws 7/18/2023 5:05:00 AM

nice questions
BRAZIL


Rahul 6/11/2023 2:07:00 AM

hi team, could you please provide this dump ?
INDIA


TeamOraTech 12/5/2023 9:49:00 AM

very helpful to clear the exam and understand the concept.
Anonymous


Curtis 7/12/2023 8:20:00 PM

i think it is great that you are helping people when they need it. thanks.
UNITED STATES


sam 7/17/2023 6:22:00 PM

cannot evaluate yet
Anonymous


nutz 7/20/2023 1:54:00 AM

a laptops wireless antenna is most likely located in the bezel of the lid
UNITED STATES


rajesh soni 1/17/2024 6:53:00 AM

good examplae to learn basic
INDIA


Tanya 10/25/2023 7:07:00 AM

this is useful information
Anonymous


Nasir Mahmood 12/11/2023 7:32:00 AM

looks usefull
Anonymous


Jason 9/30/2023 1:07:00 PM

question 81 should be c.
CANADA


TestPD1 8/10/2023 12:22:00 PM

question 18 : response isnt a ?
EUROPEAN UNION


ally 8/19/2023 5:31:00 PM

plaese add questions
TURKEY


DIA 10/7/2023 5:59:00 AM

is dumps still valid ?
FRANCE


Annie 7/7/2023 8:33:00 AM

thanks for this
EUROPEAN UNION


arnie 9/17/2023 6:38:00 AM

please upload questions
Anonymous


Tanuj Rana 7/22/2023 2:33:00 AM

please upload the question dump for professional machinelearning
Anonymous


Future practitioner 8/10/2023 1:26:00 PM

question 4 answer is c. this site shows the correct answer as b. "adopt a consumption model" is clearly a cost optimization design principle. looks like im done using this site to study!!!
Anonymous


Ace 8/3/2023 10:37:00 AM

number 52 answer is d
UNITED STATES


Nathan 12/17/2023 12:04:00 PM

just started preparing for my exam , and this site is so much help
Anonymous


Corey 12/29/2023 5:06:00 PM

question 35 is incorrect, the correct answer is c, it even states so: explanation: when a vm is infected with ransomware, you should not restore the vm to the infected vm. this is because the ransomware will still be present on the vm, and it will encrypt the files again. you should also not restore the vm to any vm within the companys subscription. this is because the ransomware could spread to other vms in the subscription. the best way to restore a vm that is infected with ransomware is to restore it to a new azure vm. this will ensure that the ransomware is not present on the new vm.
Anonymous