Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

202-450 LPIC-2 - Exam 202 (part 2 of 2), version 4.5 Questions and Answers

Questions 4

Which option within a Nginx server configuration section defines the file system path from which the content of the server is retrieved?

Options:

A.

location

B.

htdocs

C.

DocumentRoot

D.

root

E.

base_dir

Buy Now
Questions 5

What command creates a SSH key pair? (Specify ONLY the command without any path or parameters)

Options:

Buy Now
Questions 6

In a BIND zone file, what does the @ character indicate?

Options:

A.

It’s the fully qualified host name of the DNS server

B.

It’s an alias for the e-mail address of the zone master

C.

It’s the name of the zone as defined in the zone statement in named.conf

D.

It’s used to create an alias between two CNAME entries

Buy Now
Questions 7

What is the path to the global Postfix configuration file? (Specify the full name of the file, including path.)

Options:

Buy Now
Questions 8

According to this LDIF excerpt, which organizational unit is Robert Smith part of? (Specify only the organizational unit.)

Options:

Buy Now
Questions 9

Which of the following lines is valid in a configuration file in /etc/pam.d/?

Options:

A.

authrequired pam_unix.sotry_first_pass nullok

B.

authtry_first_pass nullok, require pam_unix.so

C.

authrequired:pam_unix.so(try_first_pass nullok)

D.

authpam_unix.so(required try_first_pass nullok)

Buy Now
Questions 10

Which BIND option should be used to limit the IP addresses from which slave name servers may connect?

Options:

A.

allow-zone-transfer

B.

allow-transfer

C.

allow-secondary

D.

allow-slaves

E.

allow-queries

Buy Now
Questions 11

Which of the following statements allow the logical combinations of conditions in Sieve filters? (Choose two.)

Options:

A.

allof

B.

anyof

C.

noneof

D.

and

E.

or

Buy Now
Questions 12

Which of the following sshd configuration should be set to no in order to fully disable password based logins? (Choose two.)

Options:

A.

PAM Authentication

B.

Challenge Response Authentication

C.

Permit Plaintext Login

D.

Use Passwords

E.

Password Authentication

Buy Now
Questions 13

Which Postfix command can be used to rebuild all of the alias database files with a single invocation and without the need for any command line arguments?

Options:

A.

makealiases

B.

newaliases

C.

postalias

D.

postmapbuild

Buy Now
Questions 14

What command displays NFC kernel statistics? (Specify ONLY the command without any path or parameters.)

Options:

Buy Now
Questions 15

A company is transitioning to a new DNS domain name and wants to accept e-mail for both domains for all of its users on a Postfix server.

Which configuration option should be updated to accomplish this?

Options:

A.

mydomain

B.

mylocations

C.

mydestination

D.

myhosts

E.

mydomains

Buy Now
Questions 16

Which option in named.conf specifies which host are permitted to ask for domain name information from the server?

Options:

A.

allowed-hosts

B.

accept-query

C.

permit-query

D.

allow-query

E.

query-group

Buy Now
Questions 17

There is a restricted area in a site hosted by Apache HTTPD, which requires users to authenticate against the file /srv/www/security/site­passwd.

Which command is used to CHANGE the password of existing users, without losing data, when Basic authentication is being used?

Options:

A.

htpasswd –c /srv/www/security/site­passwd user

B.

htpasswd /srv/www/security/site­passwd user

C.

htpasswd –n /srv/www/security/site­passwd user

D.

htpasswd –D /srv/www/security/site­passwd user

Buy Now
Questions 18

Which Apache HTTPD configuration directive is used to specify the method of authentication, e.g. None or Basic?

Options:

A.

AuthUser

B.

AllowedAuthUser

C.

AuthType

D.

AllowAuth

Buy Now
Questions 19

Which of the following authentication mechanisms are supported by Dovecot? (Choose three.)

Options:

A.

ldap

B.

digest-md5

C.

cram-md5

D.

plain

E.

krb5

Buy Now
Questions 20

A user requests a “hidden” Samba share, named confidential, similar to the Windows Administration Share. How can this be configured?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Buy Now
Questions 21

Which of these sets of entries does the following command return?

Options:

A.

Entries that don’t have a cn of marie or don’t have a telephoneNumber that begins with 9.

B.

Entries that have a cn of marie or don’t have a telephoneNumber beginning with 9.

C.

Entries that have a cn of marie and a telephoneNumber that ending with 9.

D.

Entries that don’t have a cn of marie and don’t have a telephoneNumber beginning with 9.

E.

Entries that have a cn of marie or have a telephoneNumber beginning with 9.

Buy Now
Questions 22

Which action in a Sieve filter forwards a message to another email address without changing the message? (Specify ONLY the action’s name without any parameters.)

Options:

Buy Now
Questions 23

Which of the following statements in the ISC DHCPD configuration is used to specify whether or not an address pool can be used by nodes which have a corresponding host section in the configuration?

Options:

A.

identified-nodes

B.

unconfigured-hosts

C.

missing-peers

D.

unmatched-hwaddr

E.

unknown-clients

Buy Now
Questions 24

For what purpose is TCP/IP stack fingerprinting used by nmap?

Options:

A.

It is used to determine the remote operating system.

B.

It is used to filter out responses from specific servers.

C.

It is used to identify duplicate responses from the same remote server.

D.

It is used to masquerade the responses of remote servers.

E.

It is used to uniquely identify servers on the network for forensics.

Buy Now
Questions 25

The content of which local file has to be transmitted to a remote SSH server in order to be able to log into the remote server using SSH keys?

Options:

A.

~/.ssh/authorized_keys

B.

~/.ssh/config

C.

~/.ssh/id_rsa.pub

D.

~/.ssh/id_rsa

E.

~./ssh/known_hosts

Buy Now
Questions 26

The program vsftpd, running in a chroot jail, gives the following error:

Which of the following actions would fix the error?

Options:

A.

The file /etc/ld.so.conf in the root filesystem must contain the path to the appropriate lib directory in the chroot jail

B.

Create a symbolic link that points to the required library outside the chroot jail

C.

Copy the required library to the appropriate lib directory in the chroot jail

D.

Run the program using the command chroot and the option--static_libs

Buy Now
Questions 27

What word is missing from the following excerpt of a named.conf file?

Options:

A.

networks

B.

net

C.

list

D.

acl

E.

group

Buy Now
Questions 28

After the installation of Dovecot, it is observed that the dovecot processes are shown in ps ax like this:

In order to associate the processes with users and peers, the username, IP address of the peer and the connection status, which of the following options must be set?

Options:

A.

--with-linux-extprocnames for ./configure when building Dovecot

B.

sys.ps.allow_descriptions = 1 in sysct1.conf or /proc

C.

proc.all.show_status = 1 in sysctl.conf or /proc

D.

verbose_proctitle = yes in the Dovecot configuration

E.

process_format = “%u %I %s” in the Dovecot configuration

Buy Now
Questions 29

What is DNSSEC used for?

Options:

A.

Encrypted DNS queries between nameservers

B.

Cryptographic authentication of DNS zones

C.

Secondary DNS queries for local zones

D.

Authentication of the user that initiated the DNS query

E.

Encrypting DNS queries and answers

Buy Now
Questions 30

Which of the following PAM modules sets and unsets environment variables?

Options:

A.

pam_set

B.

pam_shell

C.

pam-vars

D.

pam-env

E.

pam_export

Buy Now
Questions 31

Which tool creates a Certificate Signing Request (CSR) for serving HTTPS with Apache HTTPD?

Options:

A.

apachect1

B.

certgen

C.

cartool

D.

httpsgen

E.

openssl

Buy Now
Questions 32

Which of the following statements is true regarding the NFSv4 pseudo file system on the NFS server?

Options:

A.

It must be called /exports

B.

It usually contains bind mounts of the directory trees to be exported

C.

It must be a dedicated partition on the server

D.

It is defined in the option Nfsv4-Root in /etc/pathmapd.conf

E.

It usually contains symlinks to the directory trees to be exported

Buy Now
Questions 33

To allow X connections to be forwarded from or through an SSH server, what configuration keyword must be set to yes in the sshd configuration file?

Options:

A.

AllowForwarding

B.

ForwardingAllow

C.

XllForwardingAllow

D.

XllForwarding

Buy Now
Questions 34

Which of the following Samba configuration parameters is functionally identical to the parameter read only=yes?

Options:

A.

browseable=no

B.

read write=no

C.

writeable=no

D.

write only=no

E.

write access=no

Buy Now
Questions 35

What is the name of the root element of the LDAP tree holding the configuration of an OpenLDAP server that is using directory based configuration? (Specify ONLY the element’s name without any additional information.)

Options:

Buy Now
Exam Code: 202-450
Exam Name: LPIC-2 - Exam 202 (part 2 of 2), version 4.5
Last Update: Nov 21, 2024
Questions: 119

PDF + Testing Engine

$130

Testing Engine

$95

PDF (Q&A)

$80