ExamGecko
Home Home / LPI / 202-450

LPI 202-450 Practice Test - Questions Answers, Page 2

Question list
Search
Search

Related questions











The content of which local file has to be transmitted to a remote SSH server in order to be able to log into the remote server using SSH keys?

A.
~/.ssh/authorized_keys
A.
~/.ssh/authorized_keys
Answers
B.
~/.ssh/config
B.
~/.ssh/config
Answers
C.
~/.ssh/id_rsa.pub
C.
~/.ssh/id_rsa.pub
Answers
D.
~/.ssh/id_rsa
D.
~/.ssh/id_rsa
Answers
E.
~./ssh/known_hosts
E.
~./ssh/known_hosts
Answers
Suggested answer: A

Explanation:

Reference: https://www.digitalocean.com/community/tutorials/ssh-essentials-working-with-ssh-servers-clients-and-keys

What is the name of the network security scanner project which, at the core, is a server with a set of network vulnerability tests?

A.
NetMap
A.
NetMap
Answers
B.
OpenVAS
B.
OpenVAS
Answers
C.
Smartscan
C.
Smartscan
Answers
D.
Wireshark
D.
Wireshark
Answers
Suggested answer: B

With fail2ban, what is a 'jail'?

A.
A netfilter rules chain blocking offending IP addresses for a particular service
A.
A netfilter rules chain blocking offending IP addresses for a particular service
Answers
B.
A group of services on the server which should be monitored for similar attack patterns in the log files
B.
A group of services on the server which should be monitored for similar attack patterns in the log files
Answers
C.
A filter definition and a set of one or more actions to take when the filter is matched
C.
A filter definition and a set of one or more actions to take when the filter is matched
Answers
D.
The chroot environment in which fail2ban runs
D.
The chroot environment in which fail2ban runs
Answers
Suggested answer: C

Explanation:

Reference: https://docs.plesk.com/en-US/onyx/administrator-guide/server-administration/protection-against-brute-force-attacks-fail2ban/fail2ban-jails-management.73382/

The program vsftpd, running in a chroot jail, gives the following error:

Which of the following actions would fix the error?

A.
The file /etc/ld.so.conf in the root filesystem must contain the path to the appropriate lib directory in the chroot jail
A.
The file /etc/ld.so.conf in the root filesystem must contain the path to the appropriate lib directory in the chroot jail
Answers
B.
Create a symbolic link that points to the required library outside the chroot jail
B.
Create a symbolic link that points to the required library outside the chroot jail
Answers
C.
Copy the required library to the appropriate lib directory in the chroot jail
C.
Copy the required library to the appropriate lib directory in the chroot jail
Answers
D.
Run the program using the command chroot and the option--static_libs
D.
Run the program using the command chroot and the option--static_libs
Answers
Suggested answer: C

Which of the following Samba configuration parameters is functionally identical to the parameter read only=yes?

A.
browseable=no
A.
browseable=no
Answers
B.
read write=no
B.
read write=no
Answers
C.
writeable=no
C.
writeable=no
Answers
D.
write only=no
D.
write only=no
Answers
E.
write access=no
E.
write access=no
Answers
Suggested answer: C

How must Samba be configured such that it can check CIFS passwords against those found in /etc/passwd and /etc/shadow?

A.
Set the parameters "encrypt passwords = yes" and "password file = /etc/passwd"
A.
Set the parameters "encrypt passwords = yes" and "password file = /etc/passwd"
Answers
B.
Set the parameters "encrypt passwords = yes", "password file = /etc/passwd" and "passwordalgorithm = crypt"
B.
Set the parameters "encrypt passwords = yes", "password file = /etc/passwd" and "passwordalgorithm = crypt"
Answers
C.
Delete the smbpasswd file and create a symbolic link to the passwd and shadow file
C.
Delete the smbpasswd file and create a symbolic link to the passwd and shadow file
Answers
D.
It is not possible for Samba to use /etc/passwd and /etc/shadow directly
D.
It is not possible for Samba to use /etc/passwd and /etc/shadow directly
Answers
E.
Run smbpasswd to convert /etc/passwd and /etc/shadow to a Samba password file
E.
Run smbpasswd to convert /etc/passwd and /etc/shadow to a Samba password file
Answers
Suggested answer: D

In which CIFS share must printer drivers be placed to allow Point'n'Print driver deployment on Windows?

A.
winx64drv$
A.
winx64drv$
Answers
B.
print$
B.
print$
Answers
C.
The name of the share is specified in the option print driver share within each printable share in smb.conf
C.
The name of the share is specified in the option print driver share within each printable share in smb.conf
Answers
D.
pnpdrivers$
D.
pnpdrivers$
Answers
E.
NETLOGON
E.
NETLOGON
Answers
Suggested answer: B

Which of the following Samba services handles the membership of a file server in an Active Directory domain?

A.
winbindd
A.
winbindd
Answers
B.
nmbd
B.
nmbd
Answers
C.
msadd
C.
msadd
Answers
D.
admemb
D.
admemb
Answers
E.
samba
E.
samba
Answers
Suggested answer: E

Which of the following statements is true regarding the NFSv4 pseudo file system on the NFS server?

A.
It must be called /exports
A.
It must be called /exports
Answers
B.
It usually contains bind mounts of the directory trees to be exported
B.
It usually contains bind mounts of the directory trees to be exported
Answers
C.
It must be a dedicated partition on the server
C.
It must be a dedicated partition on the server
Answers
D.
It is defined in the option Nfsv4-Root in /etc/pathmapd.conf
D.
It is defined in the option Nfsv4-Root in /etc/pathmapd.conf
Answers
E.
It usually contains symlinks to the directory trees to be exported
E.
It usually contains symlinks to the directory trees to be exported
Answers
Suggested answer: B

A user requests a "hidden" Samba share, named confidential, similar to the Windows Administration Share. How can this be configured?

A.
A.
Answers
B.
B.
Answers
C.
C.
Answers
D.
D.
Answers
E.
E.
Answers
Suggested answer: E
Total 119 questions
Go to page: of 12