Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

202-450 LPIC-2 - Exam 202 (part 2 of 2), version 4.5 Questions and Answers

Questions 4

The Samba configuration file contains the following lines:

A workstation is on the wired network with an IP address of 192.168.1.177 but is unable to access the Samba server. A wireless laptop with an IP address 192.168.2.93 can access the Samba server. Additional trouble shooting shows that almost every machine on the wired network is unable to access the Samba server.

Which alternate host allow declaration will permit wired workstations to connect to the Samba server without denying access to anyone else?

Options:

A.

host allow = 192.168.1.1-255

B.

host allow = 192.168.1.100192.168.2.200localhost

C.

host deny = 192.168.1.100/255.255.255.0192.168.2.31localhost

D.

host deny = 192.168.2.200/255.255.255.0192.168.2.31localhost

E.

host allow = 192.168.1.0/255.255.255.0192.168.2.0/255.255.255.0 localhost

Buy Now
Questions 5

Which of the following lines is valid in a configuration file in /etc/pam.d/?

Options:

A.

authrequired pam_unix.sotry_first_pass nullok

B.

authtry_first_pass nullok, require pam_unix.so

C.

authrequired:pam_unix.so(try_first_pass nullok)

D.

authpam_unix.so(required try_first_pass nullok)

Buy Now
Questions 6

Which of the following values can be used in the OpenLDAP attribute olcBackend for any object of the class olcBackendConfig to specify a backend? (Choose three.)

Options:

A.

xml

B.

bdb

C.

passwd

D.

ldap

E.

text

Buy Now
Questions 7

In a BIND zone file, what does the @ character indicate?

Options:

A.

It’s the fully qualified host name of the DNS server

B.

It’s an alias for the e-mail address of the zone master

C.

It’s the name of the zone as defined in the zone statement in named.conf

D.

It’s used to create an alias between two CNAME entries

Buy Now
Questions 8

A user requests a “hidden” Samba share, named confidential, similar to the Windows Administration Share. How can this be configured?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Buy Now
Questions 9

To allow X connections to be forwarded from or through an SSH server, what configuration keyword must be set to yes in the sshd configuration file?

Options:

A.

AllowForwarding

B.

ForwardingAllow

C.

XllForwardingAllow

D.

XllForwarding

Buy Now
Questions 10

The content of which local file has to be transmitted to a remote SSH server in order to be able to log into the remote server using SSH keys?

Options:

A.

~/.ssh/authorized_keys

B.

~/.ssh/config

C.

~/.ssh/id_rsa.pub

D.

~/.ssh/id_rsa

E.

~./ssh/known_hosts

Buy Now
Questions 11

In the main Postfix configuration file, how are service definitions continued on the next line?

Options:

A.

It isn’t possible. The service definition must fit on one line.

B.

The initial line must end with a backslash character (\).

C.

The following line must begin with a plus character (+).

D.

The following line must begin with white space indentation.

E.

The service definition continues on the following lines until all of the required fields are specified.

Buy Now
Questions 12

Which of the following services belongs to NFSv4 and does not exist in NFSv3?

Options:

A.

rpc.idmapd

B.

rpc.statd

C.

nfsd

D.

rpc.mountd

Buy Now
Questions 13

What command displays NFC kernel statistics? (Specify ONLY the command without any path or parameters.)

Options:

Buy Now
Questions 14

How must Samba be configured such that it can check CIFS passwords against those found in /etc/passwd and /etc/shadow?

Options:

A.

Set the parameters “encrypt passwords = yes” and “password file = /etc/passwd”

B.

Set the parameters “encrypt passwords = yes”, “password file = /etc/passwd” and “password algorithm = crypt”

C.

Delete the smbpasswd file and create a symbolic link to the passwd and shadow file

D.

It is not possible for Samba to use /etc/passwd and /etc/shadow directly

E.

Run smbpasswd to convert /etc/passwd and /etc/shadow to a Samba password file

Buy Now
Questions 15

Which of the following commands can be used to connect and interact with remote TCP network services? (Choose two.)

Options:

A.

nettalk

B.

nc

C.

telnet

D.

cat

E.

netmap

Buy Now
Questions 16

In response to a certificate signing request, a certification authority sent a web server certificate along with the certificate of an intermediate certification authority that signed the web server certificate. What should be done with the intermediate certificate in order to use the web server certificate with Apache HTTPD?

Options:

A.

The intermediate certificate should be merged with the web server’s certificate into one file that is specified in SSLCertificateFile

B.

The intermediate certificate should be used to verify the certificate before its deployment on the web server and can be deleted

C.

The intermediate certificate should be stored in its own file which is referenced in SSLCaCertificateFile

D.

The intermediate certificate should be improved into the certificate store of the web browser used to test the correct operation of the web server

E.

The intermediate certificate should be archived and resent to the certification authority in order to request a renewal of the certificate

Buy Now
Questions 17

When trying to reverse proxy a web server through Nginx, what keyword is missing from the following configuration sample?

Options:

A.

remote_proxy

B.

reverse_proxy

C.

proxy_reverse

D.

proxy_pass

E.

forward_to

Buy Now
Questions 18

The following Apache HTTPD configuration has been set up to create a virtual host available at www.example.com and www2.example.com:

Even though Apache HTTPD correctly processed the configuration file, requests to both names are not handled correctly. What should be changed in order to ensure correct operations?

Options:

A.

The configuration must be split into two VirtualHost sections since each virtual host may only have one name.

B.

The port mentioned in opening VirtualHost tag has to be appended to the ServerName declaration’s values.

C.

Both virtual host names have to be placed as comma separated values in one ServerName declaration.

D.

Both virtual host names have to be mentioned in the opening VirtualHost tag.

E.

Only one Server name declaration may exist, but additional names can be declared in ServerAlias options.

Buy Now
Questions 19

Which of these tools provides DNS information in the following format?

Options:

A.

dig

B.

nslookup

C.

host

D.

named-checkconf

E.

named-checkzone

Buy Now
Questions 20

Which doveadm sub-command displays a list of connections of Dovecot in the following format? (Specify ONLY the command without any parameters.)

Options:

Buy Now
Questions 21

What option in the client configuration file would tell OpenVPN to use a dynamic source port when making a connection to a peer?

Options:

A.

src-port

B.

remote

C.

source-port

D.

nobind

E.

dynamic-bind

Buy Now
Questions 22

What is the name of the network security scanner project which, at the core, is a server with a set of network vulnerability tests?

Options:

A.

NetMap

B.

OpenVAS

C.

Smartscan

D.

Wireshark

Buy Now
Questions 23

In order to specify alterations to an LDAP entry, what keyword is missing from the following LDIF file excerpt?

Specify the keyword only and no other information.

Options:

Buy Now
Questions 24

Which of the statements below are correct regarding the following commands, which are executed on a Linux router? (Choose two.)

Options:

A.

Packets with source or destination addresses from fe80::/64 will never occur in the FORWARD chain

B.

The rules disable packet forwarding because network nodes always use addresses from fe80::/64 to identify routers in their routing tables

C.

ip6tables returns an error for the second command because the affected network is already part of another rule

D.

Both ip6tables commands complete without an error message or warning

E.

The rules suppress any automatic configuration through router advertisements or DHCPv6

Buy Now
Questions 25

How is the LDAP administrator account configured when the rootdn and rootpw directives are not present in the slapd.conf file?

Options:

A.

The default account admin with the password admin are used

B.

The account is defined by an ACL in slapd.conf

C.

The default account admin is used without a password

D.

The account is defined in the file /etc/ldap.secret

E.

The account is defined in the file /etc/ldap.root.conf

Buy Now
Questions 26

Which of the following actions are available in Sieve core filters? (Choose three.)

Options:

A.

drop

B.

discard

C.

fileinto

D.

relay

E.

reject

Buy Now
Questions 27

A company is transitioning to a new DNS domain name and wants to accept e-mail for both domains for all of its users on a Postfix server.

Which configuration option should be updated to accomplish this?

Options:

A.

mydomain

B.

mylocations

C.

mydestination

D.

myhosts

E.

mydomains

Buy Now
Questions 28

What is the standard port used by OpenVPN?

Options:

A.

1723

B.

4500

C.

500

D.

1194

Buy Now
Questions 29

Which option within the ISC DHCPD configuration file defines the IPv4 DNS server address(es) to be sent to the DHCP clients?

Options:

A.

domain-name-servers

B.

domain-server

C.

name-server

D.

servers

Buy Now
Questions 30

Which of the following PAM modules sets and unsets environment variables?

Options:

A.

pam_set

B.

pam_shell

C.

pam-vars

D.

pam-env

E.

pam_export

Buy Now
Questions 31

Which action in a Sieve filter forwards a message to another email address without changing the message? (Specify ONLY the action’s name without any parameters.)

Options:

Buy Now
Questions 32

What is DNSSEC used for?

Options:

A.

Encrypted DNS queries between nameservers

B.

Cryptographic authentication of DNS zones

C.

Secondary DNS queries for local zones

D.

Authentication of the user that initiated the DNS query

E.

Encrypting DNS queries and answers

Buy Now
Questions 33

The program vsftpd, running in a chroot jail, gives the following error:

Which of the following actions would fix the error?

Options:

A.

The file /etc/ld.so.conf in the root filesystem must contain the path to the appropriate lib directory in the chroot jail

B.

Create a symbolic link that points to the required library outside the chroot jail

C.

Copy the required library to the appropriate lib directory in the chroot jail

D.

Run the program using the command chroot and the option--static_libs

Buy Now
Questions 34

Using its standard configuration, how does fail2ban block offending SSH clients?

Options:

A.

By rejecting connections due to its role as a proxy in front of SSHD.

B.

By modifying and adjusting the SSHD configuration.

C.

By creating and maintaining netfilter rules.

D.

By creating null routes that drop any answer packets sent to the client.

E.

By modifying and adjusting the TCP Wrapper configuration for SSHD.

Buy Now
Questions 35

Which command is used to configure which file systems a NFS server makes available to clients?

Options:

A.

exportfs

B.

mkfs.nfs

C.

mount

D.

nfsservct1

E.

telinit

Buy Now
Exam Code: 202-450
Exam Name: LPIC-2 - Exam 202 (part 2 of 2), version 4.5
Last Update: Nov 23, 2024
Questions: 119
202-450 pdf

202-450 PDF

$25.5  $84.99
202-450 Engine

202-450 Testing Engine

$30  $99.99
202-450 PDF + Engine

202-450 PDF + Testing Engine

$40.5  $134.99