ExamGecko
Home Home / LPI / 202-450

LPI 202-450 Practice Test - Questions Answers, Page 9

Question list
Search
Search

Related questions











To allow X connections to be forwarded from or through an SSH server, what configuration keyword must be set to yes in the sshd configuration file?

A.
AllowForwarding
A.
AllowForwarding
Answers
B.
ForwardingAllow
B.
ForwardingAllow
Answers
C.
XllForwardingAllow
C.
XllForwardingAllow
Answers
D.
XllForwarding
D.
XllForwarding
Answers
Suggested answer: D

Explanation:

Reference: https://help.ubuntu.com/community/SSH/OpenSSH/Configuring

What is the standard port used by OpenVPN?

A.
1723
A.
1723
Answers
B.
4500
B.
4500
Answers
C.
500
C.
500
Answers
D.
1194
D.
1194
Answers
Suggested answer: D

Explanation:

Reference: https://openvpn.net/archive/openvpn-users/2006-04/msg00355.html

FILL BLANK

What option in the sshd configuration file instructs sshd to permit only specific user names to log in to a system? (Specify ONLY the option name without any values.)

A.
sshd_config
A.
sshd_config
Answers
Suggested answer: A

Explanation:

Reference: https://www.ssh.com/ssh/sshd_config/

Using its standard configuration, how does fail2ban block offending SSH clients?

A.
By rejecting connections due to its role as a proxy in front of SSHD.
A.
By rejecting connections due to its role as a proxy in front of SSHD.
Answers
B.
By modifying and adjusting the SSHD configuration.
B.
By modifying and adjusting the SSHD configuration.
Answers
C.
By creating and maintaining netfilter rules.
C.
By creating and maintaining netfilter rules.
Answers
D.
By creating null routes that drop any answer packets sent to the client.
D.
By creating null routes that drop any answer packets sent to the client.
Answers
E.
By modifying and adjusting the TCP Wrapper configuration for SSHD.
E.
By modifying and adjusting the TCP Wrapper configuration for SSHD.
Answers
Suggested answer: B

Explanation:

Reference: https://www.digitalocean.com/community/tutorials/how-to-protect-ssh-with-fail2ban-on-centos-7

Which FTP names are recognized as anonymous users in vsftp when the option anonymous_enable is set to yes in the configuration files? (Choose two.)

A.
anonymous
A.
anonymous
Answers
B.
ftp
B.
ftp
Answers
C.
In the described configuration, any username which neither belongs to an existing user nor has another special meaning is treated as anonymous user.
C.
In the described configuration, any username which neither belongs to an existing user nor has another special meaning is treated as anonymous user.
Answers
D.
nobody
D.
nobody
Answers
E.
guest
E.
guest
Answers
Suggested answer: A, B

Explanation:

Reference: http://vsftpd.beasts.org/vsftpd_conf.html#lbAE

Which of the following commands can be used to connect and interact with remote TCP network services? (Choose two.)

A.
nettalk
A.
nettalk
Answers
B.
nc
B.
nc
Answers
C.
telnet
C.
telnet
Answers
D.
cat
D.
cat
Answers
E.
netmap
E.
netmap
Answers
Suggested answer: B, C

To which destination will a route appear in the Linux routing table after activating IPv6 on a router's network interface, even when no global IPv6 addresses have been assigned to the interface?

A.
fe80::/10
A.
fe80::/10
Answers
B.
0::/128
B.
0::/128
Answers
C.
0::/0
C.
0::/0
Answers
D.
fe80::/64
D.
fe80::/64
Answers
E.
2000::/3
E.
2000::/3
Answers
Suggested answer: A

In order to prevent all anonymous FTP users from listing uploaded file names, what security precaution can be taken when creating an upload directory?

A.
The directory must not have the execute permission set.
A.
The directory must not have the execute permission set.
Answers
B.
The directory must not have the read permission set.
B.
The directory must not have the read permission set.
Answers
C.
The directory must not have the read or execute permission set.
C.
The directory must not have the read or execute permission set.
Answers
D.
The directory must not have the write permission set.
D.
The directory must not have the write permission set.
Answers
E.
The directory must not contain other directories.
E.
The directory must not contain other directories.
Answers
Suggested answer: B

Which command is used to administer IPv6 netfilter rules?

A.
iptables
A.
iptables
Answers
B.
iptablesv6
B.
iptablesv6
Answers
C.
iptables6
C.
iptables6
Answers
D.
ip6tables
D.
ip6tables
Answers
E.
ipv6tables
E.
ipv6tables
Answers
Suggested answer: D

Explanation:

Reference: https://www.centos.org/docs/5/html/5.1/Deployment_Guide/s1-ip6tables.html

Which netfilter table contains built-in chains called INPUT, OUTPUT and FORWARD?

A.
ipconn
A.
ipconn
Answers
B.
filter
B.
filter
Answers
C.
nat
C.
nat
Answers
D.
default
D.
default
Answers
E.
masq
E.
masq
Answers
Suggested answer: B

Explanation:

Reference: http://shorewall.org/NetfilterOverview.html

Total 119 questions
Go to page: of 12