LPI 303-200 Exam (page: 2)
LPI Security, version 2.0
Updated on: 25-Dec-2025

Viewing Page 2 of 9

Which of the following are differences between AppArmor and SELinux? (Choose TWO correct answers).

  1. AppArmor is implemented in user space only. SELinux is a Linux Kernel Module.
  2. AppArmor is less complex and easier to configure than SELinux.
  3. AppArmor neither requires nor allows any specific configuration. SELinux must always be manually configured.
  4. SELinux stores information in extended file attributes. AppArmor does not maintain file specific information and states.
  5. The SELinux configuration is loaded at boot time and cannot be changed later on AppArmor provides user space tools to change its behavior.

Answer(s): B,D



Linux Extended File Attributes are organized in namespaces. Which of the following names correspond to existing attribute namespaces? (Choose THREE correct answers.)

  1. default
  2. system
  3. owner
  4. trusted
  5. user

Answer(s): B,D,E



Which of the following expressions are valid AIDE rules? (Choose TWO correct answers.)

  1. !/var/run/.*
  2. append: /var/log/*
  3. /usr=all
  4. #/bin/
  5. /etc p+i+u+g

Answer(s): A,E



Which of the following commands defines an audit rule that monitors read and write operations to the file/etc/firewall/rules and associates the rule with the name firewall?

  1. auditctl -N firewall ­r r: /etc/firewall/rules ­r w: etc/firewall/rules
  2. auditctl -A ­f /etc/firewall/rules ­o r­ o w ­l firewall
  3. auditctl ­w /etc/firewall/rules -p rw -k firewall
  4. auditctl -_read /etc/firewall/rules -_write /etc/firewall/rules --label firewall
  5. echo "n: firewall r:/etc/firewall/rules/ w:/ etc/firewall/rules/" | auditctl ~

Answer(s): C



Which of the following resources of a shell and its child processes can be controlled by the Bash build-in command ulimit? (Choose THREE correct answers.)

  1. The maximum size of written files
  2. The maximum number of open file descriptors
  3. The maximum number of newly created files
  4. The maximum number of environment variables
  5. The maximum number of user processes

Answer(s): A,B,E



Which of the following database names can be used within a Name Service Switch (NSS) configuration file? (Choose THREE correct answers).

  1. host
  2. shadow
  3. service
  4. passwd
  5. group

Answer(s): A,C,E



Which of the following types can be specifed within the Linux Audit system? (Choose THREE correct answers)

  1. Control rules
  2. File system rules
  3. Network connecton rules
  4. Console rules
  5. System call rules

Answer(s): A,B,E



Which PAM Module checks new passwords against dictionary words and enforces complexity? (Specially the Module name only without any path.)

  1. pam_cracklib

Answer(s): A


Reference:

htpp;//www-deer-run.com/~hal/sysadmin/pam_cracklib.html



Viewing Page 2 of 9



Share your comments for LPI 303-200 exam with other users:

vel 8/28/2023 9:17:09 AM

good one with explanation
Anonymous


Gurdeep 1/18/2024 4:00:15 PM

This is one of the most useful study guides I have ever used.
CANADA