Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

LPI 202-450 LPIC-2 - Exam 202 (part 2 of 2), version 4.5 Exam Practice Test

Demo: 35 questions
Total 119 questions

LPIC-2 - Exam 202 (part 2 of 2), version 4.5 Questions and Answers

Question 1

What is the name of the Dovecot configuration variable that specifies the location of user mail?

Options:

A.

mbox

B.

mail_location

C.

user_dir

D.

maildir

E.

user_mail_dir

Question 2

What option for BIND is required in the global options to disable recursive queries on the DNS server by default?

Options:

A.

allow-recursive-query (none; );

B.

allow-recursive-query off;

C.

recursion {disabled; };

D.

recursion {none; };

E.

recursion no;

Question 3

Which of the following Samba services handles the membership of a file server in an Active Directory domain?

Options:

A.

winbindd

B.

nmbd

C.

msadd

D.

admemb

E.

samba

Question 4

In order to specify alterations to an LDAP entry, what keyword is missing from the following LDIF file excerpt?

Specify the keyword only and no other information.

Options:

Question 5

With fail2ban, what is a ‘jail’?

Options:

A.

A netfilter rules chain blocking offending IP addresses for a particular service

B.

A group of services on the server which should be monitored for similar attack patterns in the log files

C.

A filter definition and a set of one or more actions to take when the filter is matched

D.

The chroot environment in which fail2ban runs

Question 6

Which Apache HTTPD directive enables HTTPS protocol support?

Options:

A.

HTTPSEngine on

B.

SSLEngine on

C.

SSLEnable on

D.

HTTPSEnable on

E.

StartTLS on

Question 7

After running ssh-keygen and accepting the default values, which of the following files are changed or created? (Choose two.)

Options:

A.

~/.ssh/id_rsa.key

B.

~/.ssh/id_rsa.pub

C.

~/.ssh/id_rsa.prv

D.

~/.ssh/id_rsa.crt

E.

~/.ssh/id_rsa

Question 8

Which Linux user is used by vsftpd to perform file system operations for anonymous FTP users?

Options:

A.

The Linux user which runs the vsftpd process

B.

The Linux user that owns the root FTP directory served by vsftpd

C.

The Linux user with the same user name that was used to anonymously log into the FTP server

D.

The Linux user root, but vsftpd grants access to anonymous users only to globally read-/writeable files

E.

The Linux user specified in the configuration option ftp_username

Question 9

When using mod_authz_core, which of the following strings can be used as an argument to Require in an Apache HTTPD configuration file to specify the authentication provider? (Choose three.)

Options:

A.

method

B.

all

C.

regex

D.

header

E.

expr

Question 10

With Nginx, which of the following directives is used to proxy requests to a FastCGI application?

Options:

A.

fastcgi_pass

B.

fastcgi_proxy

C.

proxy_fastcgi

D.

proxy_fastcgi_pass

E.

fastcgi_forward

Question 11

Which directive in a Nginx server configuration block defines the TCP ports on which the virtual host will be available, and which protocols it will use? (Specify ONLY the option name without any values.)

Options:

Question 12

What option in the client configuration file would tell OpenVPN to use a dynamic source port when making a connection to a peer?

Options:

A.

src-port

B.

remote

C.

source-port

D.

nobind

E.

dynamic-bind

Question 13

Which option in the Postfix configuration makes Postfix pass email to external destinations to another SMTP-server? (Specify ONLY the option name without any values.)

Options:

Question 14

Select the alternative that shows the correct way to disable a user login for all users except root.

Options:

A.

The use of the pam_block module along with the /etc/login configuration file.

B.

The use of the pam_deny module along with the /etc/deny configuration file.

C.

The use of the pam_pwdb module along with the /etc/pwdv.conf configuration file.

D.

The use of the pam_nologin module along with the /etc/nologin configuration file.

Question 15

The following Apache HTTPD configuration has been set up to create a virtual host available at www.example.com and www2.example.com:

Even though Apache HTTPD correctly processed the configuration file, requests to both names are not handled correctly. What should be changed in order to ensure correct operations?

Options:

A.

The configuration must be split into two VirtualHost sections since each virtual host may only have one name.

B.

The port mentioned in opening VirtualHost tag has to be appended to the ServerName declaration’s values.

C.

Both virtual host names have to be placed as comma separated values in one ServerName declaration.

D.

Both virtual host names have to be mentioned in the opening VirtualHost tag.

E.

Only one Server name declaration may exist, but additional names can be declared in ServerAlias options.

Question 16

What is the name of the root element of the LDAP tree holding the configuration of an OpenLDAP server that is using directory based configuration? (Specify ONLY the element’s name without any additional information.)

Options:

Question 17

Which of the following actions are available in Sieve core filters? (Choose three.)

Options:

A.

drop

B.

discard

C.

fileinto

D.

relay

E.

reject

Question 18

Which configuration parameter on a Postfix server modifies only the sender address and not the recipient address?

Options:

A.

alias_maps

B.

alias_rewrite_maps

C.

sender_canonical_maps

D.

sender_rewrite_maps

Question 19

Which of the following lines is valid in a configuration file in /etc/pam.d/?

Options:

A.

authrequired pam_unix.sotry_first_pass nullok

B.

authtry_first_pass nullok, require pam_unix.so

C.

authrequired:pam_unix.so(try_first_pass nullok)

D.

authpam_unix.so(required try_first_pass nullok)

Question 20

Which of the following values can be used in the OpenLDAP attribute olcBackend for any object of the class olcBackendConfig to specify a backend? (Choose three.)

Options:

A.

xml

B.

bdb

C.

passwd

D.

ldap

E.

text

Question 21

What information can be found in the file specified by the status parameter in an OpenVPN server configuration file? (Choose two.)

Options:

A.

Errors and warnings generated by the openvpn daemon

B.

Routing information

C.

Statistical information regarding the currently running openvpn daemon

D.

A list of currently connected clients

E.

A history of all clients who have connected at some point

Question 22

When are Sieve filters usually applied to an email?

Options:

A.

When the email is delivered to a mailbox

B.

When the email is relayed by an SMTP server

C.

When the email is received by an SMTP smarthost

D.

When the email is sent to the first server by an MUA

E.

When the email is retrieved by an MUA

Question 23

According to the configuration below, what is the full e-mail address of the administrator for this domain?

Options:

Question 24

Which Apache HTTPD configuration directive specifies the RSA private key that was used in the generation of the SSL certificate for the server?

Options:

A.

SSLCertificateKeyFile

B.

SSLKeyFile

C.

SSLPrivateKeyFile

D.

SSLRSAKeyFile

Question 25

Which global option in squid.conf sets the port number or numbers that Squid will use to listen for client requests?

Options:

A.

port

B.

client_port

C.

http_port

D.

server_port

E.

squid_port

Question 26

In a BIND zone file, what does the @ character indicate?

Options:

A.

It’s the fully qualified host name of the DNS server

B.

It’s an alias for the e-mail address of the zone master

C.

It’s the name of the zone as defined in the zone statement in named.conf

D.

It’s used to create an alias between two CNAME entries

Question 27

Which of the statements below are correct regarding the following commands, which are executed on a Linux router? (Choose two.)

Options:

A.

Packets with source or destination addresses from fe80::/64 will never occur in the FORWARD chain

B.

The rules disable packet forwarding because network nodes always use addresses from fe80::/64 to identify routers in their routing tables

C.

ip6tables returns an error for the second command because the affected network is already part of another rule

D.

Both ip6tables commands complete without an error message or warning

E.

The rules suppress any automatic configuration through router advertisements or DHCPv6

Question 28

Which action in a Sieve filter forwards a message to another email address without changing the message? (Specify ONLY the action’s name without any parameters.)

Options:

Question 29

What does the samba-tool testparm command confirm regarding the Samba configuration?

Options:

A.

The configuration loads successfully.

B.

The service operates as expected.

C.

The Samba services are started automatically when the system boots.

D.

The netfilter configuration on the Samba server does not block any access to the services defined in the configuration.

E.

All running Samba processes use the most recent configuration version.

Question 30

Which keyword is used in the Squid configuration to define networks and times used to limit access to the service?

Options:

A.

acl

B.

allow

C.

http_allow

D.

permit

Question 31

Which of the following commands can be used to connect and interact with remote TCP network services? (Choose two.)

Options:

A.

nettalk

B.

nc

C.

telnet

D.

cat

E.

netmap

Question 32

What is DNSSEC used for?

Options:

A.

Encrypted DNS queries between nameservers

B.

Cryptographic authentication of DNS zones

C.

Secondary DNS queries for local zones

D.

Authentication of the user that initiated the DNS query

E.

Encrypting DNS queries and answers

Question 33

Given the following Squid configuration excerpt:

cache_dir ufs /var/spool/squid3/ 1024 16 256

Which of the following directories will exist directly within the directory /var/spool/squid3/? (Choose two.)

Options:

A.

0F

B.

A0

C.

0b

D.

FF

E.

00

Question 34

When trying to reverse proxy a web server through Nginx, what keyword is missing from the following configuration sample?

Options:

A.

remote_proxy

B.

reverse_proxy

C.

proxy_reverse

D.

proxy_pass

E.

forward_to

Question 35

What option in the sshd configuration file instructs sshd to permit only specific user names to log in to a system? (Specify ONLY the option name without any values.)

Options:

Demo: 35 questions
Total 119 questions