Top Printable 117-202 training materials Tips!

Act now and download your LPI 117-202 test today! Do not waste time for the worthless LPI 117-202 tutorials. Download Refresh LPI LPI Level 2 Exam 202 exam with real questions and answers and begin to learn LPI 117-202 with a classic professional.

2017 Jan 117-202 latest exam

Q31. You suspect that you are receiving messages with a forged From: address. What could help you find out where the mail is originating? 

A. Install TCP wrappers, and log all connections on port 25 

B. A dd the command 'FR-strlog' to the sendmail.cf file 

C. Add the command 'define ('LOG_REAL_FROM') dnl' to the sendmail.mc file 

D. Run a filter in the aliases file that checks the originating address when mail arrives 

E. Look in the Received: and Message-ID: parts of the mail header 

Answer:


Q32. What is the advantage of using SASL authentication with OpenLDAP? 

A. It can prevent the transmission of plain text passwords over the network. 

B. It disables anonymous access to the LDAP server. 

C. It enables the use of Access Control Lists. 

D. It allows the use of LDAP to authenticate system users over the network. 

E. All of the above. 

Answer:


Q33. Which THREE of the following actions should be considered when a FTP chroot jail is created? 

A. Create /dev/ and /etc/ in the chroot enviroment 

B. Create /etc/passwd in the chroot enviroment 

C. Create /var/cache/ftp in the chroot enviroment 

D. Create the user ftp in the chroot enviroment 

E. Create /usr/sbin/ in the chroot enviroment 

Answer: ABD 


Q34. Why is the root file system mounted read-only during boot and remounted with write permission later on? 

A. Because if problems with the root file system are detected during the boot, fsck can be run, without risk of damage. 

B. Because this way crackers cannot collect information about root with boot sniffers 

C. To avoid writing to the disk, unless the root password is known. 

D. To avoid other operating systems overwriting the Linux root partition 

E. Because the disk has its own write protection that cannot change by the operating system. 

Answer:


Q35. Which files are read by the lsdev command? (Please specify THREE answers) 

A. /proc/dma 

B. /proc/filesystems 

C. /proc/interrupts 

D. /proc/ioports 

E. /proc/swaps 

Answer: ACD 


Up to date 117-202 exam question:

Q36. You have to mount the /data filesystem from an NFS server(srv1) that does not support locking. Which of the following mount commands should you use? 

A. mount -a -t nfs 

B. mount -o locking=off srv1:/data /mnt/data 

C. mount -o nolocking srv1:/data /mnt/data 

D. mount -o nolock srv1:/data /mnt/data 

E. mount -o nolock /data@srv1 /mn/data 

Answer:


Q37. What security precautions must be taken when creating a directory into which files can be uploaded anonymously using FTP? 

A. The directory must not have the execute permission set. 

B. The directory must not have the read permission set. 

C. The directory must not have the read or execute permission set. 

D. The directory must not have the write permission set. 

E. The directory must not contain other directories. 

Answer:


Q38. Which of the following is needed, to synchronise the UNIX password with the SMB password, when the encrypted SMB password in the smbpasswd file is changed? 

A. Nothing, because this is not possible. 

B. Run netvamp regularly, to convert the passwords. 

C. Run winbind -sync, to synchronise the passwords. 

D. Add unix password sync = yes to smb.conf. 

E. Add smb unix password = sync to smb.conf. 

Answer:


Q39. The listing below is an excerpt from a Squid configuration file: 

A. Users connecting from localhost will be able to access web sites through this proxy. 

B. It's necessary to include a http_access rule denying access to all, at the end of the rules. 

C. It's possible to use this proxy to access SSL enabled web sites listening on any port. 

D. This proxy can't be used to access FTP servers listening on the default port. 

E. This proxy is misconfigured and no user will be able to access web sites through it. 

Answer:


Q40. Which file can be used to make sure that procmail is used to filter a user's incoming email? 

A. ${HOME}/.procmail 

B. ${HOME}/.forward 

C. ${HOME}/.bashrc 

D. /etc/procmailrc 

E. /etc/aliases 

Answer:



see more 117-202 dumps