Text Material Preview
303-300 Real Dumps https://www.certspots.com/exam/303-300/ LPIC-3 Security 303-300 Real Dumps 1. Which of the following practices are important for the security of private keys? (Choose TWO correct answers.) A.Private keys should be created on the systems where they will be used and should never leave them. B.Private keys should be uploaded to public key servers. C.Private keys should be included in X509 certificates. D.Private keys should have a sufficient length for the algorithm used for key generation. E.Private keys should always be stored as plain text files without any encryption. Answer: C D LPIC-3 Security 303-300 Real Dumps 2. What is an asymmetric key? A. A key used for encryption and decryption that is the same B. A key used for encryption that is different from the key used for decryption C. A key used for decryption that is different from the key used for encryption D. A key used for both encryption and decryption that is generated in a pair Answer: D LPIC-3 Security 303-300 Real Dumps 3. Which of the following is an example of a behavioral-based HID technique? A. Signature-based detection B. Anomaly-based detection C. Heuristic-based detection D. Rule-based detection Answer: B LPIC-3 Security 303-300 Real Dumps 4. What is privilege escalation? A. An attack that targets a specific user or organization B. An attack that aims to steal sensitive information C. An attack that exploits a vulnerability to gain elevated privileges D.An attack that floods a network or server with traffic to make it unavailable Answer: C LPIC-3 Security 303-300 Real Dumps 5. What is the purpose of TSIG in DNS? A. To encrypt DNS queries B. To sign DNS messages for secure communication C. To provide information about DNS servers D. To map a domain name to an IP address Answer: B LPIC-3 Security 303-300 Real Dumps 6. What is the purpose of DNS over TLS and DNS over HTTPS? A. To improve DNS performance B. To provide secure communication between DNS clients and servers C. To reduce DNS query times D. To allow DNS servers to communicate securely with each other Answer: B LPIC-3 Security 303-300 Real Dumps 7. What is the purpose of a Certificate Authority (CA)? A. To issue and sign X.509 certificates B. To encrypt X.509 certificates C. To decrypt X.509 certificates D. To store X.509 certificates Answer: A LPIC-3 Security 303-300 Real Dumps 8. What is the purpose of the Linux Audit system? A. To manage system log files B. To automate host scans C. To detect intrusions and system changes D. To manage installed packages Answer: C LPIC-3 Security 303-300 Real Dumps 9. Which of the following is a best practice for implementing HID? A. Install HID on every computer in the network B. Configure HID to block all incoming traffic C. Configure HID to alert security personnel of potential security incidents D. Disable HID when not actively monitoring for security incidents Answer: C LPIC-3 Security 303-300 Real Dumps 10. What is the purpose of an access control list in Linux? A. To specify fine-grained permissions for users and groups B. To encrypt a file for secure transmission C. To compress a file to save disk space D. To mark a file as executable Answer: A