LPI 300-300 Exam Questions

Questions for the 300-300 were updated on : Dec 01 ,2025

Page 1 out of 4. Viewing questions 1-15 out of 53

Question 1

Which of the following statements about automount in a FreeIPA domain are true? (Choose two.)

  • A. In a FreeIPA domain, mount points for automount are always directories.
  • B. The command ipa automount up mounts all file systems handled by automount on a FreeIPA client.
  • C. The base configuration file for automount is /etc/auto.master.
  • D. In a FreeIPA domain, automount requires SSSD to be installed on each client.
  • E. In a FreeIPA domain, automount can only mount NFS shares from FreeIPA servers.
Answer:

C, D

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Explanation:
Automounting in a FreeIPA domain involves several key aspects:
Base Configuration File (/etc/auto.master): The auto.master file is the main configuration file for the
automounter. It contains the master map which defines mount points and their corresponding maps.
This file is crucial for setting up automount points.
Example entry in /etc/auto.master:
plaintext
Copy code
/home /etc/auto.home
SSSD Requirement: In a FreeIPA domain, automount requires the System Security Services Daemon
(SSSD) to be installed and configured on each client. SSSD is used to retrieve automount maps from
the FreeIPA server, enabling the automount feature to function correctly.
Example configuration in /etc/sssd/sssd.conf:
[sssd] services = nss, pam, autofs config_file_version = 2 domains = example.com
[domain/example.com] autofs_provider = ipa ipa_server = _srv_
Reference:
Automount Configuration
FreeIPA SSSD Integration

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 2

Which of the following commands open NFSv4 ACLs in an editor? (Choose two.)

  • A. nfs4_setfacl -e
  • B. nfs4_editfacl
  • C. nfs4_stat -e --acl
  • D. nfs4_chmod -i
  • E. nfs4_conf
Answer:

A, B

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Explanation:
To open NFSv4 ACLs in an editor, the following commands can be used:
nfs4_setfacl -e: This command is used to set NFSv4 ACLs, and the -e option opens the ACLs in an
editor for modification. The command usage is:
This opens the ACL editor where the user can modify the ACLs for the specified file.
nfs4_editfacl: This command is a more intuitive way to edit NFSv4 ACLs directly in an editor. It
provides a user-friendly interface for managing ACLs.
Reference:
NFSv4 ACL Tools Documentation
NFSv4 ACLs

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 3

Given a proper network and name resolution setup, which of the following commands establishes a
trust between a FreeIPA domain and an Active Directory domain?

  • A. trustmanager add --domain ad://addom --user Administrator -w
  • B. ipa-ad --add-trust --account ADDOM\Administrator --query-password
  • C. net ad ipajoin addom -U Administrator -p
  • D. ipa trust-add --type ad addom --admin Administrator --password
  • E. ipa ad join addom -U Administrator -W
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Explanation:
To establish a trust between a FreeIPA domain and an Active Directory domain, the correct command
is ipa trust-add. This command is used to add a trust relationship with an Active Directory (AD)
domain. The --type ad specifies the type of the trust, addom is the domain name, --admin
Administrator specifies the AD administrator account, and --password prompts for the
administrator's password.
The complete command looks like this:
a trust-add --type ad addom --admin Administrator --password
This command will initiate the trust creation process, which involves providing the credentials of the
AD administrator.
Reference:
FreeIPA Trusts
FreeIPA Trust Management

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 4

What is a correct statement about FreeIPA ID views?

  • A. ID views are used to modify sudo rules on a per host base.
  • B. ID views are the FreeIPA equivalent to Active Directory SIDs.
  • C. ID views specify new values for attributes of a POSIX user or group.
  • D. ID views provide a consecutive numberspace of UIDs and GIDs for FreeIPA users and groups.
  • E. ID views always manage IDs from 32768 to 65536.
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Explanation:
In FreeIPA, ID views allow administrators to override default POSIX attributes for users and groups.
This feature is useful when integrating with other identity management systems, enabling specific
attribute values to be used on a per-host basis. This way, different POSIX attributes can be set for the
same user or group in different contexts.
Reference:
FreeIPA: ID Views
FreeIPA Documentation

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 5

When logging into a windows workstation which is member of an Active Directory domain, which of
the following user names refers to the local account bob instead of the domain-wide account bob?

  • A. bob@local
  • B. %bob%
  • C. .\bob
  • D. "bob"
  • E. bob$
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Explanation:
When logging into a Windows workstation that is a member of an Active Directory domain, the .\
prefix is used to specify a local user account rather than a domain account. Therefore, to refer to the
local account bob, you would use .\bob.
Reference:
How to Log On to Your Computer if You Are a Domain User
Windows Logon Naming Conventions

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 6

Which of the following commands connects to the share Share on the Windows Server 2012 R2
server fs1 using the SMB3 protocol?

  • A. smb3client //fs1/Share
  • B. smbclient --max-protocol SMB3 //fs1/Share
  • C. smbclient --w2k12 //fs1/share
  • D. smbclient -p 3 //fs1/Share
  • E. cifsclient //fs1/Share
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Explanation:
To connect to a share on a Windows server using the SMB3 protocol, the smbclient command with
the --max-protocol option should be used. The --max-protocol option allows you to specify the
highest SMB protocol version that should be used. Therefore, the correct command is smbclient --
max-protocol SMB3 //fs1/Share.
Reference:
smbclient man page
Samba: smbclient Command Options

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 7

Which parameter in a user object defines on which share the user's roaming profile is stored?

  • A. autoMount
  • B. logonDrive
  • C. profilePath
  • D. homePath
  • E. driveMap
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Explanation:
The profilePath parameter in a user object specifies the path to the user's roaming profile. A roaming
profile is a feature in Windows that allows user profile data to be stored on a network share so that
users can access their profiles from any workstation within the network. By setting the profilePath,
administrators can define where on the network the profile data is stored.
Reference:
Roaming User Profiles
User Account Properties

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 8

Which smbclient invocation displays a list of the available SMB shares on the remote Samba server
FileSrv1?

  • A. smbcontrol -L FileSrv1
  • B. smbshares --server FileSrv1
  • C. smbstatus -S FileSrv1
  • D. smbmount -L FileSrv1
  • E. smbclient -L FileSrv1
Answer:

E

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Explanation:
The smbclient command is used to access shared resources on a network that uses the SMB (Server
Message Block) protocol. To list the available SMB shares on a remote Samba server, the correct
invocation is smbclient -L <server_name>. Here, -L stands for "list" and <server_name> is the name
of the Samba server. Therefore, smbclient -L FileSrv1 will list all the available SMB shares on the
server named FileSrv1.
Reference:
smbclient man page
Samba: smbclient Command

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 9

Which of the following names identify services within a SSSD configuration file? (Choose three.)

  • A. kerberos
  • B. ssh
  • C. smb
  • D. nss
  • E. sudo
Answer:

A, D, E

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Explanation:
In the SSSD (System Security Services Daemon) configuration file, various services can be defined to
handle different types of access and authentication. The services listed in the SSSD configuration file
under the [sssd] section can include:
kerberos: This service allows SSSD to handle Kerberos authentication.
nss (Name Service Switch): This service provides name resolution and manages user and group
information.
sudo: This service enables SSSD to provide sudo rules based on the identity provider.
These services are specified in the services attribute of the [sssd] section of the sssd.conf file.
Example:
[sssd] services = nss, pam, sudo domains = LDAP [nss] filter_users = root filter_groups = root [sudo]
sudo_provider = ldap
Reference:
SSSD Services
SSSD Man Pages

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 10

Which of the following sections in the Kerberos configuration file may contain the option
default_realm?

  • A. defaults
  • B. krb5
  • C. libdefaults
  • D. global
  • E. realms
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Explanation:
The Kerberos configuration file, typically located at /etc/krb5.conf, contains several sections, each
with different settings that control the behavior of Kerberos. The libdefaults section is where default
settings for Kerberos libraries are defined, and it may include the default_realm option.
Example:
[libdefaults] default_realm = EXAMPLE.COM dns_lookup_realm = false dns_lookup_kdc = true
Reference:
Kerberos Configuration
Red Hat Kerberos Configuration

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 11

Which of the following sections is always present in sssd.conf?

  • A. [krb5]
  • B. [ad]
  • C. [autn]
  • D. [sssd]
  • E. [local]
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Explanation:
The sssd.conf file is the configuration file for the System Security Services Daemon (SSSD). SSSD
provides access to different identity and authentication providers. The configuration file typically
contains multiple sections, but the [sssd] section is always present. This section provides global
options that apply to all other sections of the file.
Example:
[sssd] config_file_version = 2 services = nss, pam domains = LDAP
Reference:
SSSD Configuration
SSSD Man Pages

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 12

FILL BLANK
Which command line option instructs smbclient to authenticate using an existing Kerberos token?
(Specify ONLY the option name without any values or parameters.)

Answer:

-k

User Votes:

Explanation:
The smbclient command is used to access shared resources on a server running the SMB/CIFS
protocol. To authenticate using an existing Kerberos token, the -k option is used. This instructs
smbclient to use Kerberos for authentication, assuming that the user already has a valid Kerberos
ticket (usually obtained via the kinit command).
Example:
smbclient //server/share -k
Reference:
smbclient man page
Kerberos Authentication with Samba

Discussions
vote your answer:
0 / 1000

Question 13

Which of the following keywords are module types for PAM? (Choose three.)

  • A. cache
  • B. authentication
  • C. password
  • D. session
  • E. account
Answer:

C, D, E

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Explanation:
Pluggable Authentication Modules (PAM) provides a system of libraries that handle the
authentication tasks of applications (services) on a Linux system. These libraries are loaded
dynamically and can be configured in the /etc/pam.d directory or in /etc/pam.conf. The PAM
modules are divided into four types:
auth (authentication): This module type is responsible for authenticating the user, setting up user
credentials, and initiating a session.
account: This module type manages account policies such as password expiration, access restrictions,
and checking user permissions.
password: This module type handles the updating of authentication tokens, such as passwords.
session: This module type manages tasks that need to be performed at the beginning and end of a
session, like mounting directories or logging.
Reference:
Linux PAM Documentation
Understanding PAM

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 14

Which of the following Group Policy Objects exist by default in an Active Directory domain? (Choose
two.)

  • A. Default Domain Policy
  • B. Default Domain Controllers Policy
  • C. Default Domain File Access Policy
  • D. Default Domain Firewall Policy
  • E. Default Domain Print Driver Policy
Answer:

A, B

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Explanation:
Default Group Policy Objects in AD:
A . Default Domain Policy: This is a built-in GPO that is applied to all users and computers in the
domain. It contains security settings, password policies, and other domain-wide configurations.
B . Default Domain Controllers Policy: This GPO is specifically applied to the Domain Controllers
organizational unit (OU). It contains settings relevant to domain controllers, such as security settings
and audit policies.
Reference:
Active Directory Group Policy documentation
Best practices for managing Group Policy in Active Directory

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 15

FILL BLANK
What service name must be added to a database entry in /etc/nsswitch.conf to include SSSD as a
source of information? (Specify ONLY the service name without any parameters.)

Answer:

sss

User Votes:

Explanation:
Adding SSSD to /etc/nsswitch.conf:
To include SSSD (System Security Services Daemon) as a source of information in the
/etc/nsswitch.conf file, the service name sss must be added. This is specified without any
parameters. The sss service allows the system to retrieve information from various sources, such as
LDAP, Kerberos, and others, as configured in SSSD.
Reference:
SSSD documentation
nsswitch.conf configuration guidelines

Discussions
vote your answer:
0 / 1000
To page 2