Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

202-450 Sample Questions Answers

Questions 4

Which of the following actions synchronizes UNIX passwords with the Samba passwords when the encrypted Samba password is changed using smbpasswd?

Options:

A.

There are no actions to accomplish this since is not possible.

B.

Run netvamp regularly, to convert the passwords.

C.

Run winbind –sync, to synchronize the passwords.

D.

Add unix password sync = yes to smb.conf

E.

Add smb unix password = sync to smb.conf

Buy Now
Questions 5

Which keyword is used in the Squid configuration to define networks and times used to limit access to the service?

Options:

A.

acl

B.

allow

C.

http_allow

D.

permit

Buy Now
Questions 6

How is the LDAP administrator account configured when the rootdn and rootpw directives are not present in the slapd.conf file?

Options:

A.

The default account admin with the password admin are used

B.

The account is defined by an ACL in slapd.conf

C.

The default account admin is used without a password

D.

The account is defined in the file /etc/ldap.secret

E.

The account is defined in the file /etc/ldap.root.conf

Buy Now
Questions 7

According to the configuration below, what is the full e-mail address of the administrator for this domain?

Options:

Buy Now
Questions 8

Which Postfix command can be used to rebuild all of the alias database files with a single invocation and without the need for any command line arguments?

Options:

A.

makealiases

B.

newaliases

C.

postalias

D.

postmapbuild

Buy Now
Questions 9

After the installation of Dovecot, it is observed that the dovecot processes are shown in ps ax like this:

In order to associate the processes with users and peers, the username, IP address of the peer and the connection status, which of the following options must be set?

Options:

A.

--with-linux-extprocnames for ./configure when building Dovecot

B.

sys.ps.allow_descriptions = 1 in sysct1.conf or /proc

C.

proc.all.show_status = 1 in sysctl.conf or /proc

D.

verbose_proctitle = yes in the Dovecot configuration

E.

process_format = “%u %I %s” in the Dovecot configuration

Buy Now
Questions 10

Select the Samba option below that should be used if the main intention is to setup a guest printer service?

Options:

A.

security = cups

B.

security = ldap

C.

security = pam

D.

security = share

E.

security = printing

Buy Now
Questions 11

Which of the following commands is used to change user passwords in an OpenLDAP directory?

Options:

A.

setent

B.

ldpasswd

C.

olppasswd

D.

ldappasswd

E.

ldapchpw

Buy Now
Questions 12

Performing a DNS lookup with dig results in this answer:

Options:

A.

There is no . after linuserv.example.net in the PTR record in the forward lookup zone file

B.

There is no . after linuserv in the PTR record in the forward lookup zone file

C.

There is no . after linuserv.example.net in the PTR record in the reverse lookup zone file

D.

The . in the NS definition in the reverse lookup zone has to be removed

Buy Now
Questions 13

To which destination will a route appear in the Linux routing table after activating IPv6 on a router’s network interface, even when no global IPv6 addresses have been assigned to the interface?

Options:

A.

fe80::/10

B.

0::/128

C.

0::/0

D.

fe80::/64

E.

2000::/3

Buy Now
Questions 14

Which Apache HTTPD configuration directive is used to specify the method of authentication, e.g. None or Basic?

Options:

A.

AuthUser

B.

AllowedAuthUser

C.

AuthType

D.

AllowAuth

Buy Now
Questions 15

Which of the following PAM modules sets and unsets environment variables?

Options:

A.

pam_set

B.

pam_shell

C.

pam-vars

D.

pam-env

E.

pam_export

Buy Now
Questions 16

Which of the following values can be used in the OpenLDAP attribute olcBackend for any object of the class olcBackendConfig to specify a backend? (Choose three.)

Options:

A.

xml

B.

bdb

C.

passwd

D.

ldap

E.

text

Buy Now
Questions 17

What command displays NFC kernel statistics? (Specify ONLY the command without any path or parameters.)

Options:

Buy Now
Questions 18

For what purpose is TCP/IP stack fingerprinting used by nmap?

Options:

A.

It is used to determine the remote operating system.

B.

It is used to filter out responses from specific servers.

C.

It is used to identify duplicate responses from the same remote server.

D.

It is used to masquerade the responses of remote servers.

E.

It is used to uniquely identify servers on the network for forensics.

Buy Now
Questions 19

With fail2ban, what is a ‘jail’?

Options:

A.

A netfilter rules chain blocking offending IP addresses for a particular service

B.

A group of services on the server which should be monitored for similar attack patterns in the log files

C.

A filter definition and a set of one or more actions to take when the filter is matched

D.

The chroot environment in which fail2ban runs

Buy Now
Questions 20

The following Apache HTTPD configuration has been set up to create a virtual host available at www.example.com and www2.example.com:

Even though Apache HTTPD correctly processed the configuration file, requests to both names are not handled correctly. What should be changed in order to ensure correct operations?

Options:

A.

The configuration must be split into two VirtualHost sections since each virtual host may only have one name.

B.

The port mentioned in opening VirtualHost tag has to be appended to the ServerName declaration’s values.

C.

Both virtual host names have to be placed as comma separated values in one ServerName declaration.

D.

Both virtual host names have to be mentioned in the opening VirtualHost tag.

E.

Only one Server name declaration may exist, but additional names can be declared in ServerAlias options.

Buy Now
Questions 21

A host, called lpi, with the MAC address 08:00:2b:4c:59:23 should always be given the IP address of 192.168.1.2 by a DHCP server running ISC DHCPD.

Which of the following configurations will achieve this?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Buy Now
Questions 22

How must Samba be configured such that it can check CIFS passwords against those found in /etc/passwd and /etc/shadow?

Options:

A.

Set the parameters “encrypt passwords = yes” and “password file = /etc/passwd”

B.

Set the parameters “encrypt passwords = yes”, “password file = /etc/passwd” and “password algorithm = crypt”

C.

Delete the smbpasswd file and create a symbolic link to the passwd and shadow file

D.

It is not possible for Samba to use /etc/passwd and /etc/shadow directly

E.

Run smbpasswd to convert /etc/passwd and /etc/shadow to a Samba password file

Buy Now
Questions 23

What is the path to the global Postfix configuration file? (Specify the full name of the file, including path.)

Options:

Buy Now
Questions 24

In order to join a file server to the Active Directory domain intra.example.com, the following smb.conf has been created:

The command net ads join raises an error and the server is not joined to the domain. What should be done to successfully join the domain?

Options:

A.

Change server role to ad member server to join an Active Directory domain instead of an NT4 domain.

B.

Add realm = intra.example.com to the smb.conf and change workgroup to the domain’s netbios workgroup name.

C.

Manually create a machine account in the Active Directory domain and specify the machine account’s name with –U when starting net ads join.

D.

Remove the winbind enum users and winbind enum groups since winbind is incompatible with Active Directory domains.

E.

Remove all idmap configuration stanzas since the id mapping is defined globally in an Active Directory domain and cannot be changed on a member server.

Buy Now
Questions 25

Which option within the ISC DHCPD configuration file defines the IPv4 DNS server address(es) to be sent to the DHCP clients?

Options:

A.

domain-name-servers

B.

domain-server

C.

name-server

D.

servers

Buy Now
Questions 26

Which of the following commands can be used to connect and interact with remote TCP network services? (Choose two.)

Options:

A.

nettalk

B.

nc

C.

telnet

D.

cat

E.

netmap

Buy Now
Questions 27

Which of the following are logging directives in Apache HTTPD? (Choose two.)

Options:

A.

TransferLog

B.

CustomLog

C.

ErrorLog

D.

ServerLog

E.

VHostLog

Buy Now
Questions 28

Which of the following DNS records could be a glue record?

Options:

A.

ns1.labA198.51.100.53

B.

labNS198.51.100.53

C.

ns1.labNS198.51.100.53

D.

ns1.A198.51.100.53

E.

ns1.labGLUE198.51.100.53

Buy Now
Questions 29

Which of the following PAM modules allows the system administrator to use an arbitrary file containing a list of user and group names with restrictions on the system resources available to them?

Options:

A.

pam_filter

B.

pam_limits

C.

pam_listfile

D.

pam_unix

Buy Now
Questions 30

Which attitude of an object in LDAP defines which other attributes can be set for the object? (Specify ONLY the attribute name without any values.)

Options:

Buy Now
Questions 31

The Samba configuration file contains the following lines:

A workstation is on the wired network with an IP address of 192.168.1.177 but is unable to access the Samba server. A wireless laptop with an IP address 192.168.2.93 can access the Samba server. Additional trouble shooting shows that almost every machine on the wired network is unable to access the Samba server.

Which alternate host allow declaration will permit wired workstations to connect to the Samba server without denying access to anyone else?

Options:

A.

host allow = 192.168.1.1-255

B.

host allow = 192.168.1.100192.168.2.200localhost

C.

host deny = 192.168.1.100/255.255.255.0192.168.2.31localhost

D.

host deny = 192.168.2.200/255.255.255.0192.168.2.31localhost

E.

host allow = 192.168.1.0/255.255.255.0192.168.2.0/255.255.255.0 localhost

Buy Now
Questions 32

Which http_access directive for Squid allows users in the ACL named sales_net to only access the Internet at times specified in the time_acl named sales_time?

Options:

A.

http_access deny sales_time sales_net

B.

http_access allow sales_net sales_time

C.

http_access allow sales_net and sales-time

D.

allow http_access sales_net sales_time

E.

http_access sales_net sales_time

Buy Now
Questions 33

When using mod_authz_core, which of the following strings can be used as an argument to Require in an Apache HTTPD configuration file to specify the authentication provider? (Choose three.)

Options:

A.

method

B.

all

C.

regex

D.

header

E.

expr

Buy Now
Questions 34

Select the alternative that shows the correct way to disable a user login for all users except root.

Options:

A.

The use of the pam_block module along with the /etc/login configuration file.

B.

The use of the pam_deny module along with the /etc/deny configuration file.

C.

The use of the pam_pwdb module along with the /etc/pwdv.conf configuration file.

D.

The use of the pam_nologin module along with the /etc/nologin configuration file.

Buy Now
Questions 35

Which of the following lines is valid in a configuration file in /etc/pam.d/?

Options:

A.

authrequired pam_unix.sotry_first_pass nullok

B.

authtry_first_pass nullok, require pam_unix.so

C.

authrequired:pam_unix.so(try_first_pass nullok)

D.

authpam_unix.so(required try_first_pass nullok)

Buy Now
Exam Code: 202-450
Exam Name: LPIC-2 - Exam 202 (part 2 of 2), version 4.5
Last Update: Nov 20, 2024
Questions: 119
$64  $159.99
$48  $119.99
$40  $99.99
buy now 202-450