This page was exported from IT Certification Exam Braindumps [ http://blog.braindumpsit.com ] Export date:Wed Apr 16 19:08:09 2025 / +0000 GMT ___________________________________________________ Title: 303-300 Dumps Special Discount for limited time Try FOR FREE [Q22-Q42] --------------------------------------------------- 303-300 Dumps Special Discount for limited time Try FOR FREE 303-300 Dumps for success in Actual Exam Feb-2025] NO.22 Which of the following commands displays all ebtable rules contained in the table filter including their packet and byte counters?  ebtables -t nat -L -v  ebtables -L -t filter -Lv  ebtables -t filter -L –Lc  ebtables -t filter -Ln -L  ebtables -L -Lc -t filter NO.23 Which command is used to run a new shell for a user changing the SELinux context?(Specify ONLY the command without any path or parameters.)Solution: newroleDetermine whether the given solution is correct?  Correct  Incorrect NO.24 In which path is the data, which can be altered by the sysctl command, accessible?  /dev/sys/  /sys/  /proc/sys/  /sysctl/ NO.25 What is the purpose of an extended attribute in Linux?  To store additional metadata about a file  To encrypt a file for secure transmission  To compress a file to save disk space  To mark a file as executable NO.26 What is the purpose of a Certificate Authority (CA)?  To issue and sign X.509 certificates  To encrypt X.509 certificates  To decrypt X.509 certificates  To store X.509 certificates NO.27 How does TSIG authenticate name servers in order to perform secured zone transfers?  Both servers mutually verify their X509 certificates.  Both servers use a secret key that is shared between the servers.  Both servers verify appropriate DANE records for the labels of the NS records used to delegate the transferred zone.  Both servers use DNSSEC to mutually verify that they are authoritative for the transferred zone. NO.28 Which file is used to configure AIDE?  /etc/rkhunter.conf  /etc/audit/auditd.conf  /etc/aide/aide.conf  /etc/maldet.conf NO.29 What is Linux Malware Detect?  A package management tool  A tool to automate host scans  A tool to detect malware on a Linux system  A configuration management tool NO.30 Which of the following resources of a shell and its child processes can be controlled by the Bash build- in command ulimit?(Choose THREE correct answers.)  The maximum size of written files  The maximum number of open file descriptors  The maximum number of newly created files  The maximum number of environment variables  The maximum number of user processes NO.31 Which command is used to set the owner and group of a file in Linux?  chown  chmod  chgrp  setfacl NO.32 Which command revokes ACL-based write access for groups and named users on the file afile?  setfacl -x group: * : rx, user:*: rx afile  setfacl -x mask: : rx afile  setfacl ~m mask: : rx afile  setfacl ~m group: * : rx, user :*: rx afile NO.33 What is the purpose of TSIG in DNS?  To encrypt DNS queries  To sign DNS messages for secure communication  To provide information about DNS servers  To map a domain name to an IP address NO.34 Which of the following practices are important for the security of private keys?(Choose TWO correct answers.)  Private keys should be created on the systems where they will be used and should never leave them.  Private keys should be uploaded to public key servers.  Private keys should be included in X509 certificates.  Private keys should have a sufficient length for the algorithm used for key generation.  Private keys should always be stored as plain text files without any encryption. NO.35 Which of the following DNS records is used to publish X.509 certificate and certificate authority information in DNS?  DS  CAA  NSEC  A NO.36 How are SELinux permissions related to standard Linux permissions?(Choose TWO correct answers.)  SELinux permissions override standard Linux permissions.  Standard Linux permissions override SELinux permissions.  SELinux permissions are verified before standard Linux permissions.  SELinux permissions are verified after standard Linux permissions. NO.37 Which of the following methods can be used to deactivate a rule in Snort?(Choose TWO correct answers.)  By placing a # in front of the rule and restarting Snort.  By placing a pass rule in local.rules and restarting Snort.  By deleting the rule and waiting for Snort to reload its rules files automatically.  By adding a pass rule to /etc/snort/rules.deactivated and waiting for Snort to reload its rules files automatically. NO.38 Which of the following commands adds users using SSSD’s local service?  sss_adduser  sss_useradd  sss_add  sss-addlocaluser  sss_local_adduser NO.39 What is a plaintext?  The original message before encryption  The encrypted message  The key used to encrypt the message  The algorithm used to encrypt the message NO.40 Which of the following utilities is used to generate keys for DNSSEC?  dnssec-dsfromkey  rndc  delv  dnssec-keygen NO.41 What is a honeypot?  A type of virus  A network security tool designed to lure attackers into a trap  A type of phishing scam  A type of denial-of-service attack NO.42 What option of mount.cifs specifies the user that appears as the local owner of the files of a mounted CIFS share when the server does not provide ownership information?(Specify ONLY the option name without any values or parameters.)Solution: uid=argDetermine whether the given solution is correct?  Correct  Incorrect  Loading … Accurate 303-300 Answers 365 Days Free Updates: https://www.braindumpsit.com/303-300_real-exam.html --------------------------------------------------- Images: https://blog.braindumpsit.com/wp-content/plugins/watu/loading.gif https://blog.braindumpsit.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2025-02-17 09:07:26 Post date GMT: 2025-02-17 09:07:26 Post modified date: 2025-02-17 09:07:26 Post modified date GMT: 2025-02-17 09:07:26