Given a proper network and name resolution setup, which of the following commands establishes a trust between a FreelPA domain and an Active Directory domain?
A. ipa trust-add --type ad addom --admin Administrator --password
B. ipa-ad -add-trust --account ADDOM\Administrator--query-password
C. net ad ipajoin addom -U Administrator -p
D. trustmanager add -_domain ad: //addom --user Administrator -w
E. ipa ad join addom -U Administrator -w
Which of the following sections are allowed within the Kerberos configuration file krb5.conf? (Choose THREE correct answers.)
A. [plugins]
B. [crypto]
C. [domain]
D. [capaths]
E. [realms]
Which of the following components are part of FreelPA? (Choose THREE correct answers.)
A. DHCP Server
B. Kerberos KDC
C. lntrusion Detection System
D. Public Key lnfrastructure
E. Directory Server
Which PAM module checks new passwords against dictionary words and enforces complexity? (Specially the module name only without any path.)
Which command installs and configures a new FreelPA server, including all sub-components, and creates a new FreelPA domain? (Specially ONLY the command without any path or parameters).
Which of the following database names can be used within a Name Service Switch (NSS) configuration file? (Choose THREE correct answers).
A. host
B. shadow
C. service
D. passwd
E. group
Which of the following types can be specified within the Linux Audit system? (Choose THREE correct answers)
A. Control rules
B. File system rules
C. Network connection rules
D. Console rules
E. System call rules
Which of the following resources of a shell and its child processes can be controlled by the Bash build-in command ulimit? (Choose THREE correct answers.)
A. The maximum size of written files
B. The maximum number of open file descriptors
C. The maximum number of newly created files
D. The maximum number of environment variables
E. The maximum number of user processes
Which of the following expressions are valid AlDE rules? (Choose TWO correct answers.)
A. !/var/run/.*
B. append: /var/log/*
C. /usr=all
D. #/bin/
E. /etc p+i+u+g
Which of the following commands defines an audit rule that monitors read and write operations to the file/ etc/firewall/rules and associates the rule with the name firewall?
A. auditctl -N firewall -r r: /etc/firewall/rules -r w: etc/firewall/rules
B. auditctl -A –f/etc/firewall/rules -o r- o w -| firewall
C. auditctl -w /etc/firewall/rules -p rw -k firewall
D. auditctl -_read /etc/firewall/rules -_write /etc/firewall/rules --label firewall
E. echo "n: firewall r:/etc/firewall/rules: w:/etc/firewall/rules:" | auditctl ~
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Lpi exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 303-200 exam preparations and Lpi certification application, do not hesitate to visit our Vcedump.com to find your solutions here.