LPIC-2 Exam 202, Part 2 of 2, version 4.0
Question No: 101 – (Topic 2)
Which TWO of the following commands could be used to add a second IP address to eth0?
A. ifconfig eth0 – add ip 192.168.123.10
B. ifconfig eth0:1 192.168.123.10 C. ifconfig eth0 1 192.168.123.10 D. ifconfig eth0 192.168.123.10
E. ifconfig eth0:sub1 192.168.123.10
Question No: 102 – (Topic 2)
A system monitoring service checks the availability of a database server on port 5432 of destination.example.com. The problem with this is that the password will be sent in clear text. When using an SSH tunnel to solve the problem, which command should be used?
ssh -1 5432:127.0.0.1:5432 destination.example. com
ssh -L 5432:destination.example.com:5432 127.0.0.1
ssh -L 5432:127.0.0.1:5432 destination.example.com
ssh -x destination.example.com:5432
ssh -R 5432:127.0.0.1:5432 destination.example.com
Question No: 103 – (Topic 2)
Which of these tools can provide the most information about DNS queries?
Question No: 104 CORRECT TEXT – (Topic 2)
In which configuration file can a key-file be defined to enable secure DNS zone transfers? (Please enter the file name without the path)
Question No: 105 CORRECT TEXT – (Topic 2)
What command must be used to create an SSH key-pair? Please enter the command without the path or any options or parameters.
Question No: 106 – (Topic 2)
Remote access to a CD-RW device on a machine on a LAN must be restricted to a selected user group. Select the TWO correct alternatives that describe the possible solutions for this problem.
The remote access to these devices can be allowed to users by changing the display manager configuration and allowing sudo access for the user that will log in remotely
The pam_console module allows access configuration to these devices via console, including simultaneous access by many users
The pam_console module can be used to control access to devices via console, allowing/denying access to these devices in the user#39;s session
If the pam_console module is used, it must be checked as required, because it is essential for user authentication
Through the sudo configuration file, it is possible to set users that will have the power of the root user, so they can access the devices. Besides that, it is important to configure the
/etc/pam.d/su file, so the PAM modules can secure the service
Question No: 107 – (Topic 2)
A server is being used as a smurf amplifier, whereby it is responding to ICMP Echo- Request packets sent to its broadcast address. To disable this, which command needs to be run?
ifconfig eth0 nobroadcast
echo quot;0quot; gt; /proc/sys/net/ipv4/icmp_echo_accept_broadcasts
iptables -A INPUT -p icmp -j REJECT
echo quot;1quot; gt; /proc/sys/net/ipv4/icmp_echo_ignore_broadcasts
echo quot;1quot; gt; /proc/sys/net/ipv4/icmp_echo_nosmurf
Question No: 108 CORRECT TEXT – (Topic 2)
Please enter the Kerberos 5 configuration file name without path below.
Question No: 109 – (Topic 2)
The following is an excerpt from the output of tcpdump -nli eth1 #39;udp#39;:
13:03:17.277327 IP 192.168.123.5.1065 gt; 192.168.5.112.53: 43653 A? lpi.org. (25)
13:03:17.598624 IP 192.168.5.112.53 gt; 192.168.123.5.1065: 43653 1/0/0 A 184.108.40.206
Which network service or protocol was used?
Question No: 110 – (Topic 2)
Which of the following sentences is TRUE about FreeS/WAN?
FreeS/WAN doesn#39;t support remote users (i.e. notebook users with dynamic IP addresses) connecting to the LAN
FreeS/WAN needs a patch to support NAT traversal for users behind a NAT gateway
FreeS/WAN doesn#39;t require any Linux kernel 2.4 modules to work properly
FreeS/WAN only enables the use of strong encryption between Linux hosts
FreeS/WAN can#39;t be used to establish a VPN between a Linux host and a Microsoft Windows 2000 Server host
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|