Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

LPIC-2 - Exam 202 (part 2 of 2), version 4.5

Last Update 16 hours ago Total Questions : 119

The LPIC-2 - Exam 202 (part 2 of 2), version 4.5 content is now fully updated, with all current exam questions added 16 hours ago. Deciding to include 202-450 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 202-450 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 202-450 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any LPIC-2 - Exam 202 (part 2 of 2), version 4.5 practice test comfortably within the allotted time.

Question # 21

Which statements about the Alias and Redirect directives in Apache HTTPD’s configuration file are true? (Choose two.)

A.

Alias can only reference files under DocumentRoot

B.

Redirect works with regular expressions

C.

Redirect is handled on the client side

D.

Alias is handled on the server side

E.

Alias is not a valid configuration directive

Question # 22

Which configuration parameter on a Postfix server modifies only the sender address and not the recipient address?

A.

alias_maps

B.

alias_rewrite_maps

C.

sender_canonical_maps

D.

sender_rewrite_maps

Question # 23

There is a restricted area in a site hosted by Apache HTTPD, which requires users to authenticate against the file /srv/www/security/site­passwd.

Which command is used to CHANGE the password of existing users, without losing data, when Basic authentication is being used?

A.

htpasswd –c /srv/www/security/site­passwd user

B.

htpasswd /srv/www/security/site­passwd user

C.

htpasswd –n /srv/www/security/site­passwd user

D.

htpasswd –D /srv/www/security/site ­passwd user

Question # 24

Which of the following is correct about this excerpt from an LDIF file?

A.

dn is the domain name.

B.

o is the operator name.

C.

cn is the common name.

D.

dn is the relative distinguished name.

E.

DC is the delegation container.

Question # 25

Which OpenLDAP client command can be used to change the password for an LDAP entry? (Specify ONLY the command without any path or parameters.)

Question # 26

When the default policy for the netfilter INPUT chain is set to DROP, why should a rule allowing traffic to localhost exist?

A.

All traffic to localhost must always be allowed

B.

It doesn’t matter; netfilter never affects packets addressed to localhost

C.

Some applications use the localhost interface to communicate with other applications

D.

syslogd receives messages on localhost

E.

The iptables command communicates with the netfilter management daemon netfilterd on localhost to create and change packet filter rules

Question # 27

The following Apache HTTPD configuration has been set up to create a virtual host available at www.example.com and www2.example.com:

Even though Apache HTTPD correctly processed the configuration file, requests to both names are not handled correctly. What should be changed in order to ensure correct operations?

A.

The configuration must be split into two VirtualHost sections since each virtual host may only have one name.

B.

The port mentioned in opening VirtualHost tag has to be appended to the ServerName declaration’s values.

C.

Both virtual host names have to be placed as comma separated values in one ServerName declaration.

D.

Both virtual host names have to be mentioned in the opening VirtualHost tag.

E.

Only one Server name declaration may exist, but additional names can be declared in ServerAlias options.

Question # 28

Which of the following actions are available in Sieve core filters? (Choose three.)

A.

drop

B.

discard

C.

fileinto

D.

relay

E.

reject

Question # 29

What is DNSSEC used for?

A.

Encrypted DNS queries between nameservers

B.

Cryptographic authentication of DNS zones

C.

Secondary DNS queries for local zones

D.

Authentication of the user that initiated the DNS query

E.

Encrypting DNS queries and answers

Question # 30

Which of the statements below are correct regarding the following commands, which are executed on a Linux router? (Choose two.)

A.

Packets with source or destination addresses from fe80::/64 will never occur in the FORWARD chain

B.

The rules disable packet forwarding because network nodes always use addresses from fe80::/64 to identify routers in their routing tables

C.

ip6tables returns an error for the second command because the affected network is already part of another rule

D.

Both ip6tables commands complete without an error message or warning

E.

The rules suppress any automatic configuration through router advertisements or DHCPv6

Go to page: