Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

202-450 LPIC-2 - Exam 202 (part 2 of 2), version 4.5 Free Practice Exam Questions (2025 Updated)

Prepare effectively for your LPI 202-450 LPIC-2 - Exam 202 (part 2 of 2), version 4.5 certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 2
Total 119 questions

Which BIND option should be used to limit the IP addresses from which slave name servers may connect?

A.

allow-zone-transfer

B.

allow-transfer

C.

allow-secondary

D.

allow-slaves

E.

allow-queries

Which of the following services belongs to NFSv4 and does not exist in NFSv3?

A.

rpc.idmapd

B.

rpc.statd

C.

nfsd

D.

rpc.mountd

The following Apache HTTPD configuration has been set up to create a virtual host available at www.example.com and www2.example.com:

Even though Apache HTTPD correctly processed the configuration file, requests to both names are not handled correctly. What should be changed in order to ensure correct operations?

A.

The configuration must be split into two VirtualHost sections since each virtual host may only have one name.

B.

The port mentioned in opening VirtualHost tag has to be appended to the ServerName declaration’s values.

C.

Both virtual host names have to be placed as comma separated values in one ServerName declaration.

D.

Both virtual host names have to be mentioned in the opening VirtualHost tag.

E.

Only one Server name declaration may exist, but additional names can be declared in ServerAlias options.

For what purpose is TCP/IP stack fingerprinting used by nmap?

A.

It is used to determine the remote operating system.

B.

It is used to filter out responses from specific servers.

C.

It is used to identify duplicate responses from the same remote server.

D.

It is used to masquerade the responses of remote servers.

E.

It is used to uniquely identify servers on the network for forensics.

Which Apache HTTPD directive enables HTTPS protocol support?

A.

HTTPSEngine on

B.

SSLEngine on

C.

SSLEnable on

D.

HTTPSEnable on

E.

StartTLS on

Which of the following nmap parameters scans a target for open TCP ports? (Choose two.)

A.

-sO

B.

-sZ

C.

-sT

D.

-sU

E.

-sS

Which doveadm sub-command displays a list of connections of Dovecot in the following format? (Specify ONLY the command without any parameters.)

Which Postfix command can be used to rebuild all of the alias database files with a single invocation and without the need for any command line arguments?

A.

makealiases

B.

newaliases

C.

postalias

D.

postmapbuild

With Nginx, which of the following directives is used to proxy requests to a FastCGI application?

A.

fastcgi_pass

B.

fastcgi_proxy

C.

proxy_fastcgi

D.

proxy_fastcgi_pass

E.

fastcgi_forward

Which of the following DNS records could be a glue record?

A.

ns1.labA198.51.100.53

B.

labNS198.51.100.53

C.

ns1.labNS198.51.100.53

D.

ns1.A198.51.100.53

E.

ns1.labGLUE198.51.100.53

Which of the following authentication mechanisms are supported by Dovecot? (Choose three.)

A.

ldap

B.

digest-md5

C.

cram-md5

D.

plain

E.

krb5

What command creates a SSH key pair? (Specify ONLY the command without any path or parameters)

What option in the sshd configuration file instructs sshd to permit only specific user names to log in to a system? (Specify ONLY the option name without any values.)

Which of the following lines in the sshd configuration file should, if present, be changed in order to increase the security of the server? (Choose two.)

A.

Protocol 2, 1

B.

PermitEmptyPasswords no

C.

Port 22

D.

PermitRootLogin yes

E.

IgnoreRhosts yes

Which of the following values can be used in the OpenLDAP attribute olcBackend for any object of the class olcBackendConfig to specify a backend? (Choose three.)

A.

xml

B.

bdb

C.

passwd

D.

ldap

E.

text

Page: 2 / 2
Total 119 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved