Download LPIC-2 Exam 202.202-450.VCEplus.2024-08-05.80q.vcex

Vendor: LPI
Exam Code: 202-450
Exam Name: LPIC-2 Exam 202
Date: Aug 05, 2024
File Size: 901 KB
Downloads: 2

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
For what purpose is TCP/IP stack fingerprinting used by nmap?
  1. It is used to determine the remote operating system.
  2. It is used to filter out responses from specific servers.
  3. It is used to identify duplicate responses from the same remote server.
  4. It is used to masquerade the responses of remote servers.
  5. It is used to uniquely identify servers on the network for forensics.
Correct answer: A
Explanation:
Reference: https://nmap.org/nmap-fingerprinting-old.html
Reference: https://nmap.org/nmap-fingerprinting-old.html
Question 2
To allow X connections to be forwarded from or through an SSH server, what configuration keyword must be set to yes in the sshd configuration file?
  1. AllowForwarding
  2. ForwardingAllow
  3. XllForwardingAllow
  4. XllForwarding
Correct answer: D
Explanation:
Reference: https://help.ubuntu.com/community/SSH/OpenSSH/Configuring
Reference: https://help.ubuntu.com/community/SSH/OpenSSH/Configuring
Question 3
What is the standard port used by OpenVPN?
  1. 1723
  2. 4500
  3. 500
  4. 1194
Correct answer: D
Explanation:
Reference: https://openvpn.net/archive/openvpn-users/2006-04/msg00355.html
Reference: https://openvpn.net/archive/openvpn-users/2006-04/msg00355.html
Question 4
What option in the sshd configuration file instructs sshd to permit only specific user names to log in to a system? (Specify ONLY the option name without any values.)
  1. sshd_config
Correct answer: 1
Explanation:
Reference: https://www.ssh.com/ssh/sshd_config/
Reference: https://www.ssh.com/ssh/sshd_config/
Question 5
Using its standard configuration, how does fail2ban block offending SSH clients?
  1. By rejecting connections due to its role as a proxy in front of SSHD.
  2. By modifying and adjusting the SSHD configuration.
  3. By creating and maintaining netfilter rules.
  4. By creating null routes that drop any answer packets sent to the client.
  5. By modifying and adjusting the TCP Wrapper configuration for SSHD.
Correct answer: B
Explanation:
Reference: https://www.digitalocean.com/community/tutorials/how-to-protect-ssh-with-fail2ban-on-centos-7
Reference: https://www.digitalocean.com/community/tutorials/how-to-protect-ssh-with-fail2ban-on-centos-7
Question 6
Which of the following nmap parameters scans a target for open TCP ports? (Choose two.)
  1. -sO
  2. -sZ
  3. -sT
  4. -sU
  5. -sS
Correct answer: CE
Question 7
Which of the statements below are correct regarding the following commands, which are executed on a Linux router? (Choose two.)
  1. Packets with source or destination addresses from fe80::/64 will never occur in the FORWARD chain
  2. The rules disable packet forwarding because network nodes always use addresses from fe80::/64 to identify routers in their routing tables
  3. ip6tables returns an error for the second command because the affected network is already part of another rule
  4. Both ip6tables commands complete without an error message or warning
  5. The rules suppress any automatic configuration through router advertisements or DHCPv6
Correct answer: DE
Question 8
What option in the client configuration file would tell OpenVPN to use a dynamic source port when making a connection to a peer?
  1. src-port
  2. remote
  3. source-port
  4. nobind
  5. dynamic-bind
Correct answer: D
Question 9
Which Linux user is used by vsftpd to perform file system operations for anonymous FTP users?
  1. The Linux user which runs the vsftpd process
  2. The Linux user that owns the root FTP directory served by vsftpd
  3. The Linux user with the same user name that was used to anonymously log into the FTP server
  4. The Linux user root, but vsftpd grants access to anonymous users only to globally read-/writeable files
  5. The Linux user specified in the configuration option ftp_username
Correct answer: E
Question 10
Which of the following sshd configuration should be set to no in order to fully disable password based logins? (Choose two.)
  1. PAMAuthentication
  2. ChallengegeResponseAuthentication
  3. PermitPlaintextLogin
  4. UsePasswords
  5. PasswordAuthentication
Correct answer: BE
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!