[Free] 2018(Jan) EnsurePass Testinsides LPI 202-400 Dumps with VCE and PDF 191-200

By | February 12, 2018

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan LPI Official New Released 202-400
100% Free Download! 100% Pass Guaranteed!

LPIC-2 Exam 202, Part 2 of 2, version 4.0

Question No: 191 – (Topic 2)

As of Linux kernel 2.4, which software is used to configure a VPN?

  1. IPSec

  2. SSH

  3. net – tools

  4. FreeS/WAN

  5. iproute2

Answer: D

Question No: 192 – (Topic 2)

What command must be used to print the kernel#39;s routing table?

  1. route print

  2. route enumerate

  3. route show

  4. route list

  5. route

Answer: E

Question No: 193 – (Topic 2)

Which TWO of the following wireless tools can be used to check the wireless network link quality?

  1. iwconfig

  2. iwlink

  3. iwscan

  4. iwifi

  5. iwspy

Answer: A,E

Question No: 194 CORRECT TEXT – (Topic 2)

Which site-specific configuration file for the shadow login suite must be modified to log login failures? Please enter the complete path to that file.

Answer: /etc/login.defs

Question No: 195 CORRECT TEXT – (Topic 2)

In which file, on an INN news server, can access to the news server be configured? (Enter only the file name).

Answer: readers.conf

Question No: 196 – (Topic 2)

What must be done on a host to allow a user to log in to that host using an SSH key?

  1. Add their private key to ~/. ssh/authorized_keys

  2. Reference their public key in ~/. ssh/config

  3. Run ssh-agent on that host

  4. Add their public key to ~/. ssh/authorized_keys

  5. Reference their private key in ~/. ssh/config

Answer: D

Question No: 197 CORRECT TEXT – (Topic 2)

According to the dhcpd.conf file below, which domain name will clients in the network get?

Ensurepass 2018 PDF and VCE

Answer: lab.certkiller.com

Question No: 198 – (Topic 2)

Which option must be used with ifconfig, to also see interfaces that are down?

  1. -d

  2. -a

  3. -all

  4. -down

  5. None.

Answer: A

Question No: 199 – (Topic 2)

Which of the following sentences is true, when using the following /etc/pam.d/login file?


auth required /lib/security/pam_securetty.so auth required /lib/security/pam_nologin.so

auth sufficient /lib/security/pam_unix.so shadow nullok md5 use_authtok auth required /lib/security/pam_ldap.so use_first_pass

account sufficient /lib/security/pam_unix.so account required /lib/security/pam_ldap.so password required /lib/security/pam_cracklib.so

password sufficient /lib/security/pam_unix.so nullok use_authtok md5 shadow password required /lib/security/pam_ldap.so use_first_pass

session optional /lib/security/pam_console.so session sufficient /lib/security/pam_unix.so session required /lib/security/pam_ldap.so

  1. All users will be authenticated against the LDAP directory

  2. This is the only file needed to configure LDAP authentication on Linux

  3. Only local users will be able to log in, when the file/etc/nologin exists

  4. Ordinary users will be able to change their password to be blank

  5. If the control flags for auth were changed to required, local users wouldn#39;t be able to log in

Answer: D

Question No: 200 CORRECT TEXT – (Topic 2)

To allow X connections to be forwarded from or through an SSH server, what line must exist in the sshd configuration file?

Answer: X11Forwarding yes

100% Ensurepass Free Download!
Download Free Demo:202-400 Demo PDF
100% Ensurepass Free Guaranteed!
202-400 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.