[Newest Version] Free 117-202 PDF and Exam Questions Download 100% Pass Exam

Don’t worry about how to get yourself well prepared your Recent Updates Apr 18,2022 Newest 117-202 vce dumps exam! We will work you out of your Recent Updates Hotest 117-202 study guide exam with the latest updated LPI Level 2 Exam 202 117-202 new questions . We provides the latest real Recent Updates 117-202 vce, covering every aspect of Newest 117-202 vce dumps exam curriculum.

We Geekcert has our own expert team. They selected and published the latest 117-202 preparation materials from Official Exam-Center.

The following are the 117-202 free dumps. Go through and check the validity and accuracy of our 117-202 dumps.117-202 free dumps are questions from the latest full 117-202 dumps. Check 117-202 free questions to get a better understanding of 117-202 exams.

Question 1:

Journalling doesn\’t appear to be working on an ext3 file-system. When booting, the following line appears:

VFS: Mounted root (ext2 filesystem) readonly. What could be causing the problem?

A. An old version of e2fsprogs is installed.

B. The kernel does not contain ext3 support.

C. The file-system is specified as ext2 in/etc/fstab.

D. The system was not shut down cleanly.

Correct Answer: B


Question 2:

What is the missing keyword in the following configuration sample for dovecot which defines which authentication types to support?

(Specify only the keywork) auth default { ______ = plain login cram-md5 }

A. auth_order

B. mechanisms

C. methods

D. supported

Correct Answer: B


Question 3:

You suspect that you are receiving messages with a forged From: address. What could help you find out where the mail is originating?

A. Install TCP wrappers, and log all connections on port 25

B. A dd the command \’FR-strlog\’ to the sendmail.cf file

C. Add the command \’define (\’LOG_REAL_FROM\’) dnl\’ to the sendmail.mc file

D. Run a filter in the aliases file that checks the originating address when mail arrives

E. Look in the ReceiveD. and Message-ID. parts of the mail header

Correct Answer: E


Question 4:

Which of the following organisations track and report on security related flaws in computer technology? (Please select TWO answers)

A. Bugtraq

B. CERT

C. CSIS

D. Freshmeat

E. Kernel.org

Correct Answer: AC


Question 5:

Which of the following options can be passed to a DHCP client machine using configuration options on the DHCP server?

A. The NIS domain name

B. The resolving order in /etc/resolv.conf

C. The priority order in nsswitch.conf

D. The filter rules for iptables

E. The contents of hosts.allow and hosts.deny

Correct Answer: A


Question 6:

Which Squid configuration directive defines the authentication method to use?

A. auth_param

B. auth_method

C. auth_program

D. auth_mechanism

E. proxy_auth

Correct Answer: A


Question 7:

There is a restricted area in an Apache site, which requires users to authenticate against the file /srv/ www/ security/site-passwd.

Which command is used to CHANGE the password of existing users, without losing data, when Basic authentication is being used.

A. htpasswd -c /srv/www/security/site passwd user

B. htpasswd /srv/www/security/site-passwd user

C. htpasswd -n /srv/www/security/site-passwd user

D. htpasswd -D /srv/www/security/site-passwd user

E. None of the above.

Correct Answer: B


Question 8:

When Apache is configured to use name-based virtual hosts:

A. it\’s also necessary to configure a different IP address for each virtual host.

B. the Listen directive is ignored by the server.

C. it starts multiple daemons (one for each virtual host).

D. it\’s also necessary to create a VirtualHost block for the main host.

E. only the directives ServerName and DocumentRoot may be used inside a block.

Correct Answer: D


Question 9:

Which option must be used with ifconfig, to also see interfaces that are down?

A. -d

B. -a

C. –all

D. –down

E. None.

Correct Answer: A


Question 10:

An SSH server is configured to use tcp_wrappers and only hosts from the class C network 192.168.1.0 should be allowed to access it. Which of the following lines would achieve this, when entered in/etc/hosts.allow?

A. ALLOW: 192.168.1.0/255.255.255.0 : sshd

B. sshd : 192.168.1.0/255.255.255.0 : ALLOW

C. 192.168.1.0/255.255.255.0 : ALLOW: sshd

D. tcpD. sshd : 192.168.1.0/255.255.255.0 : ALLOW

E. sshd : ALLOW: 192.168.1.0/255.255.255.0

Correct Answer: B


Question 11:

Which TWO /etc/hosts.allow entries will allow access to sshd from the class C network 192.168.1.0?

A. sshd : 192.168.1.

B. sshd : 192.168.1

C. sshd : 192.168.1.0 netmask 255.255.255.0

D. sshd : 192.168.1.0/255.255.255.0

E. sshd : 192.168.1.0

Correct Answer: AD


Question 12:

Which of the following can the program tripwire NOT check?

A. File size.

B. File signature.

C. Permissions.

D. File existence.

E. Boot sectors.

Correct Answer: E


Question 13:

Which command line create an SSH tunnel for POP and SMTP protocols?

A. ssh- L :110 -L :25 -1 user -N mailhost

B. ssh -L 25:110 -1 user -N mailhost

C. ssh -L mailhost:110 -L mailhost:25 -1 user -N mailhost

D. ssh -L mailhost:25:110 -1 user

E. ssh -L 110:mailhost:110 -L 25:mailhost:25 -1 user -N mailhost

Correct Answer: E


Question 14:

Which command would release the current IP address leased by a DHCP server?

A. ipconfig /release

B. ifconfig –release-all

C. dhclient -r

D. ifconfig –release

E. pump –release

Correct Answer: C


Question 15:

What command can be used to check the Samba configuration file?

A. testconfig

B. testsmbconfig

C. smbtestcfg

D. smbtestparm

E. testparm

Correct Answer: E


Leave a Reply

Your email address will not be published.