Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which option within a Nginx server configuration section defines the file system path from which the content of the server is retrieved?

A.

location

B.

htdocs

C.

DocumentRoot

D.

root

E.

base_dir

Full Access
Question # 5

Which option in named.conf specifies which host are permitted to ask for domain name information from the server?

A.

allowed-hosts

B.

accept-query

C.

permit-query

D.

allow-query

E.

query-group

Full Access
Question # 6

It has been discovered that the company mail server is configured as an open relay. Which of the following actions would help prevent the mail server from being used as an open relay while maintaining the possibility to receive company mails? (Choose two.)

A.

Restrict Postfix to only accept e-mail for domains hosted on this server

B.

Configure Dovecot to support IMAP connectivity

C.

Configure netfilter to not permit port 25 traffic on the public network

D.

Restrict Postfix to only relay outbound SMTP from the internal network

E.

Upgrade the mailbox format from mbox to maildir

Full Access
Question # 7

Which of the statements below are correct regarding the following commands, which are executed on a Linux router? (Choose two.)

A.

Packets with source or destination addresses from fe80::/64 will never occur in the FORWARD chain

B.

The rules disable packet forwarding because network nodes always use addresses from fe80::/64 to identify routers in their routing tables

C.

ip6tables returns an error for the second command because the affected network is already part of another rule

D.

Both ip6tables commands complete without an error message or warning

E.

The rules suppress any automatic configuration through router advertisements or DHCPv6

Full Access
Question # 8

Which of the following are logging directives in Apache HTTPD? (Choose two.)

A.

TransferLog

B.

CustomLog

C.

ErrorLog

D.

ServerLog

E.

VHostLog

Full Access
Question # 9

Select the Samba option below that should be used if the main intention is to setup a guest printer service?

A.

security = cups

B.

security = ldap

C.

security = pam

D.

security = share

E.

security = printing

Full Access
Question # 10

Which of the following Samba services handles the membership of a file server in an Active Directory domain?

A.

winbindd

B.

nmbd

C.

msadd

D.

admemb

E.

samba

Full Access
Question # 11

Which option within the ISC DHCPD configuration file defines the IPv4 DNS server address(es) to be sent to the DHCP clients?

A.

domain-name-servers

B.

domain-server

C.

name-server

D.

servers

Full Access
Question # 12

The following Apache HTTPD configuration has been set up to create a virtual host available at www.example.com and www2.example.com:

Even though Apache HTTPD correctly processed the configuration file, requests to both names are not handled correctly. What should be changed in order to ensure correct operations?

A.

The configuration must be split into two VirtualHost sections since each virtual host may only have one name.

B.

The port mentioned in opening VirtualHost tag has to be appended to the ServerName declaration’s values.

C.

Both virtual host names have to be placed as comma separated values in one ServerName declaration.

D.

Both virtual host names have to be mentioned in the opening VirtualHost tag.

E.

Only one Server name declaration may exist, but additional names can be declared in ServerAlias options.

Full Access
Question # 13

Which of these sets of entries does the following command return?

A.

Entries that don’t have a cn of marie or don’t have a telephoneNumber that begins with 9.

B.

Entries that have a cn of marie or don’t have a telephoneNumber beginning with 9.

C.

Entries that have a cn of marie and a telephoneNumber that ending with 9.

D.

Entries that don’t have a cn of marie and don’t have a telephoneNumber beginning with 9.

E.

Entries that have a cn of marie or have a telephoneNumber beginning with 9.

Full Access
Question # 14

Which http_access directive for Squid allows users in the ACL named sales_net to only access the Internet at times specified in the time_acl named sales_time?

A.

http_access deny sales_time sales_net

B.

http_access allow sales_net sales_time

C.

http_access allow sales_net and sales-time

D.

allow http_access sales_net sales_time

E.

http_access sales_net sales_time

Full Access
Question # 15

Which OpenLDAP client command can be used to change the password for an LDAP entry? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 16

Which of the following lines is valid in a configuration file in /etc/pam.d/?

A.

authrequired pam_unix.sotry_first_pass nullok

B.

authtry_first_pass nullok, require pam_unix.so

C.

authrequired:pam_unix.so(try_first_pass nullok)

D.

authpam_unix.so(required try_first_pass nullok)

Full Access
Question # 17

Which of the following statements are true regarding Server Name Indication (SNI)? (Choose two.)

A.

It supports transparent failover of TLS sessions from one web server to another.

B.

It allows multiple SSL/TLS secured virtual HTTP hosts to coexist on the same IP address.

C.

It enables HTTP servers to update the DNS of their virtual hosts’ names using the X 509 certificates of the virtual hosts.

D.

It provides a list of available virtual hosts to the client during the TLS handshake.

E.

It submits the host name of the requested URL during the TLS handshake.

Full Access
Question # 18

What is the standard port used by OpenVPN?

A.

1723

B.

4500

C.

500

D.

1194

Full Access
Question # 19

Which of the following OpenVPN configuration options makes OpenVPN forward network packets between VPN clients itself instead of passing the packets on to the Linux host which runs the OpenVPN server for further processing?

A.

inter-client-traffic

B.

client-to-client

C.

client-router

D.

client-pass

E.

grant-client-traffic

Full Access
Question # 20

When are Sieve filters usually applied to an email?

A.

When the email is delivered to a mailbox

B.

When the email is relayed by an SMTP server

C.

When the email is received by an SMTP smarthost

D.

When the email is sent to the first server by an MUA

E.

When the email is retrieved by an MUA

Full Access
Question # 21

Which BIND option should be used to limit the IP addresses from which slave name servers may connect?

A.

allow-zone-transfer

B.

allow-transfer

C.

allow-secondary

D.

allow-slaves

E.

allow-queries

Full Access
Question # 22

A host, called lpi, with the MAC address 08:00:2b:4c:59:23 should always be given the IP address of 192.168.1.2 by a DHCP server running ISC DHCPD.

Which of the following configurations will achieve this?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 23

Select the alternative that shows the correct way to disable a user login for all users except root.

A.

The use of the pam_block module along with the /etc/login configuration file.

B.

The use of the pam_deny module along with the /etc/deny configuration file.

C.

The use of the pam_pwdb module along with the /etc/pwdv.conf configuration file.

D.

The use of the pam_nologin module along with the /etc/nologin configuration file.

Full Access
Question # 24

Which configuration parameter on a Postfix server modifies only the sender address and not the recipient address?

A.

alias_maps

B.

alias_rewrite_maps

C.

sender_canonical_maps

D.

sender_rewrite_maps

Full Access
Question # 25

The content of which local file has to be transmitted to a remote SSH server in order to be able to log into the remote server using SSH keys?

A.

~/.ssh/authorized_keys

B.

~/.ssh/config

C.

~/.ssh/id_rsa.pub

D.

~/.ssh/id_rsa

E.

~./ssh/known_hosts

Full Access
Question # 26

The Samba configuration file contains the following lines:

A workstation is on the wired network with an IP address of 192.168.1.177 but is unable to access the Samba server. A wireless laptop with an IP address 192.168.2.93 can access the Samba server. Additional trouble shooting shows that almost every machine on the wired network is unable to access the Samba server.

Which alternate host allow declaration will permit wired workstations to connect to the Samba server without denying access to anyone else?

A.

host allow = 192.168.1.1-255

B.

host allow = 192.168.1.100192.168.2.200localhost

C.

host deny = 192.168.1.100/255.255.255.0192.168.2.31localhost

D.

host deny = 192.168.2.200/255.255.255.0192.168.2.31localhost

E.

host allow = 192.168.1.0/255.255.255.0192.168.2.0/255.255.255.0 localhost

Full Access
Question # 27

Which of the following authentication mechanisms are supported by Dovecot? (Choose three.)

A.

ldap

B.

digest-md5

C.

cram-md5

D.

plain

E.

krb5

Full Access
Question # 28

Which Apache HTTPD directive enables HTTPS protocol support?

A.

HTTPSEngine on

B.

SSLEngine on

C.

SSLEnable on

D.

HTTPSEnable on

E.

StartTLS on

Full Access
Question # 29

What command displays NFC kernel statistics? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 30

With Nginx, which of the following directives is used to proxy requests to a FastCGI application?

A.

fastcgi_pass

B.

fastcgi_proxy

C.

proxy_fastcgi

D.

proxy_fastcgi_pass

E.

fastcgi_forward

Full Access
Question # 31

In which CIFS share must printer drivers be placed to allow Point’n’Print driver deployment on Windows?

A.

winx64drv$

B.

print$

C.

The name of the share is specified in the option print driver share within each printable share in smb.conf

D.

pnpdrivers$

E.

NETLOGON

Full Access
Question # 32

In a PAM configuration file, which of the following is true about the required control flag?

A.

If the module returns success, no more modules of the same type will be invoked

B.

The success of the module is needed for the module-type facility to succeed. If it returns a failure, control is returned to the calling application

C.

The success of the module is needed for the module-type facility to succeed. However, all remaining modules of the same type will be invoked

D.

The module is not critical and whether it returns success or failure is not important

E.

If the module returns failure, no more modules of the same type will be invoked

Full Access
Question # 33

Which Linux user is used by vsftpd to perform file system operations for anonymous FTP users?

A.

The Linux user which runs the vsftpd process

B.

The Linux user that owns the root FTP directory served by vsftpd

C.

The Linux user with the same user name that was used to anonymously log into the FTP server

D.

The Linux user root, but vsftpd grants access to anonymous users only to globally read-/writeable files

E.

The Linux user specified in the configuration option ftp_username

Full Access
Question # 34

Which Apache HTTPD configuration directive specifies the RSA private key that was used in the generation of the SSL certificate for the server?

A.

SSLCertificateKeyFile

B.

SSLKeyFile

C.

SSLPrivateKeyFile

D.

SSLRSAKeyFile

Full Access
Question # 35

How are PAM modules organized and stored?

A.

As plain text files in /etc/security/

B.

A statically linked binaries in /etc/pam.d/bin/

C.

As Linux kernel modules within the respective sub directory of /lib/modules/

D.

As shared object files within the /lib/ directory hierarchy

E.

As dynamically linked binaries in /usr/lib/pam/sbin/

Full Access