Weekend Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

202-450 PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

202-450 PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: LPIC-2 - Exam 202 (part 2 of 2), version 4.5
  • Last Update: Sep 14, 2025
  • Questions and Answers: 119
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

202-450 Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

202-450 Practice Exam Questions with Answers LPIC-2 - Exam 202 (part 2 of 2), version 4.5 Certification

Question # 6

How are PAM modules organized and stored?

A.

As plain text files in /etc/security/

B.

A statically linked binaries in /etc/pam.d/bin/

C.

As Linux kernel modules within the respective sub directory of /lib/modules/

D.

As shared object files within the /lib/ directory hierarchy

E.

As dynamically linked binaries in /usr/lib/pam/sbin/

Full Access
Question # 7

Which attitude of an object in LDAP defines which other attributes can be set for the object? (Specify ONLY the attribute name without any values.)

Full Access
Question # 8

Performing a DNS lookup with dig results in this answer:

202-450 question answer

A.

There is no . after linuserv.example.net in the PTR record in the forward lookup zone file

B.

There is no . after linuserv in the PTR record in the forward lookup zone file

C.

There is no . after linuserv.example.net in the PTR record in the reverse lookup zone file

D.

The . in the NS definition in the reverse lookup zone has to be removed

Full Access
Question # 9

On a Linux router, packet forwarding for IPv4 has been enabled. After a reboot, the machine no longer forwards IP packets from other hosts. The command:

echo 1 > /proc/sys/net/ipv4/ip_forward

temporarily resolves this issue.

Which one of the following options is the best way to ensure this setting is saved across system restarts?

A.

Add echo 1 > /proc/sys/net/ipv4/ip_forward to the root user login script

B.

Add echo 1 > /proc/sys/net/ipv4/ip_forward to any user login script

C.

In /etc/sysct1.conf change net.ipv4.ip_forward to 1

D.

In /etc/rc.local add net.ipv4.ip_forward = 1

E.

In /etc/sysconfig/iptables-config add ipv4.ip_forward = 1

Full Access
Question # 10

Which of the following PAM modules allows the system administrator to use an arbitrary file containing a list of user and group names with restrictions on the system resources available to them?

A.

pam_filter

B.

pam_limits

C.

pam_listfile

D.

pam_unix

Full Access
Question # 11

Which keyword is used in the Squid configuration to define networks and times used to limit access to the service?

A.

acl

B.

allow

C.

http_allow

D.

permit

Full Access
Question # 12

Which of the following options are valid in /etc/exports? (Choose two.)

A.

rw

B.

ro

C.

rootsquash

D.

norootsquash

E.

uid

Full Access
Question # 13

Which configuration parameter on a Postfix server modifies only the sender address and not the recipient address?

A.

alias_maps

B.

alias_rewrite_maps

C.

sender_canonical_maps

D.

sender_rewrite_maps

Full Access
Question # 14

Which of the following Samba configuration parameters is functionally identical to the parameter read only=yes?

A.

browseable=no

B.

read write=no

C.

writeable=no

D.

write only=no

E.

write access=no

Full Access
Question # 15

For what purpose is TCP/IP stack fingerprinting used by nmap?

A.

It is used to determine the remote operating system.

B.

It is used to filter out responses from specific servers.

C.

It is used to identify duplicate responses from the same remote server.

D.

It is used to masquerade the responses of remote servers.

E.

It is used to uniquely identify servers on the network for forensics.

Full Access
Question # 16

In a PAM configuration file, which of the following is true about the required control flag?

A.

If the module returns success, no more modules of the same type will be invoked

B.

The success of the module is needed for the module-type facility to succeed. If it returns a failure, control is returned to the calling application

C.

The success of the module is needed for the module-type facility to succeed. However, all remaining modules of the same type will be invoked

D.

The module is not critical and whether it returns success or failure is not important

E.

If the module returns failure, no more modules of the same type will be invoked

Full Access
Question # 17

Select the Samba option below that should be used if the main intention is to setup a guest printer service?

A.

security = cups

B.

security = ldap

C.

security = pam

D.

security = share

E.

security = printing

Full Access
Question # 18

What command creates a SSH key pair? (Specify ONLY the command without any path or parameters)

Full Access
Question # 19

Select the alternative that shows the correct way to disable a user login for all users except root.

A.

The use of the pam_block module along with the /etc/login configuration file.

B.

The use of the pam_deny module along with the /etc/deny configuration file.

C.

The use of the pam_pwdb module along with the /etc/pwdv.conf configuration file.

D.

The use of the pam_nologin module along with the /etc/nologin configuration file.

Full Access
Question # 20

After the installation of Dovecot, it is observed that the dovecot processes are shown in ps ax like this:

202-450 question answer

In order to associate the processes with users and peers, the username, IP address of the peer and the connection status, which of the following options must be set?

A.

--with-linux-extprocnames for ./configure when building Dovecot

B.

sys.ps.allow_descriptions = 1 in sysct1.conf or /proc

C.

proc.all.show_status = 1 in sysctl.conf or /proc

D.

verbose_proctitle = yes in the Dovecot configuration

E.

process_format = “%u %I %s” in the Dovecot configuration

Full Access
Question # 21

Which Apache HTTPD configuration directive is used to specify the method of authentication, e.g. None or Basic?

A.

AuthUser

B.

AllowedAuthUser

C.

AuthType

D.

AllowAuth

Full Access
Question # 22

A company is transitioning to a new DNS domain name and wants to accept e-mail for both domains for all of its users on a Postfix server.

Which configuration option should be updated to accomplish this?

A.

mydomain

B.

mylocations

C.

mydestination

D.

myhosts

E.

mydomains

Full Access
Question # 23

If there is no access directive, what is the default setting for OpenLDAP?

202-450 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 24

Which of the following values can be used in the OpenLDAP attribute olcBackend for any object of the class olcBackendConfig to specify a backend? (Choose three.)

A.

xml

B.

bdb

C.

passwd

D.

ldap

E.

text

Full Access
Question # 25

Which of the following actions are available in Sieve core filters? (Choose three.)

A.

drop

B.

discard

C.

fileinto

D.

relay

E.

reject

Full Access
Question # 26

Which of the following DNS record types is used for reverse DNS queries?

A.

CNAME

B.

IN

C.

PTR

D.

REV

E.

RIN

Full Access
Question # 27

Which of the following PAM modules sets and unsets environment variables?

A.

pam_set

B.

pam_shell

C.

pam-vars

D.

pam-env

E.

pam_export

Full Access
Question # 28

What is DNSSEC used for?

A.

Encrypted DNS queries between nameservers

B.

Cryptographic authentication of DNS zones

C.

Secondary DNS queries for local zones

D.

Authentication of the user that initiated the DNS query

E.

Encrypting DNS queries and answers

Full Access
Question # 29

Which statements about the Alias and Redirect directives in Apache HTTPD’s configuration file are true? (Choose two.)

A.

Alias can only reference files under DocumentRoot

B.

Redirect works with regular expressions

C.

Redirect is handled on the client side

D.

Alias is handled on the server side

E.

Alias is not a valid configuration directive

Full Access
Question # 30

Which of the following commands can be used to connect and interact with remote TCP network services? (Choose two.)

A.

nettalk

B.

nc

C.

telnet

D.

cat

E.

netmap

Full Access
Question # 31

Which of the following are logging directives in Apache HTTPD? (Choose two.)

A.

TransferLog

B.

CustomLog

C.

ErrorLog

D.

ServerLog

E.

VHostLog

Full Access
Question # 32

What option in the client configuration file would tell OpenVPN to use a dynamic source port when making a connection to a peer?

A.

src-port

B.

remote

C.

source-port

D.

nobind

E.

dynamic-bind

Full Access
Question # 33

Which Linux user is used by vsftpd to perform file system operations for anonymous FTP users?

A.

The Linux user which runs the vsftpd process

B.

The Linux user that owns the root FTP directory served by vsftpd

C.

The Linux user with the same user name that was used to anonymously log into the FTP server

D.

The Linux user root, but vsftpd grants access to anonymous users only to globally read-/writeable files

E.

The Linux user specified in the configuration option ftp_username

Full Access
Question # 34

Which of the following statements in the ISC DHCPD configuration is used to specify whether or not an address pool can be used by nodes which have a corresponding host section in the configuration?

A.

identified-nodes

B.

unconfigured-hosts

C.

missing-peers

D.

unmatched-hwaddr

E.

unknown-clients

Full Access
Question # 35

How is the LDAP administrator account configured when the rootdn and rootpw directives are not present in the slapd.conf file?

A.

The default account admin with the password admin are used

B.

The account is defined by an ACL in slapd.conf

C.

The default account admin is used without a password

D.

The account is defined in the file /etc/ldap.secret

E.

The account is defined in the file /etc/ldap.root.conf

Full Access