LPIC-2 Exam 202

Here you have the best LPI 202-450 practice exam questions

  • You have 120 total questions to study from
  • Each page has 5 questions, making a total of 24 pages
  • You can navigate through the pages using the buttons at the bottom
  • This questions were last updated on December 14, 2024
Question 1 of 120

On a Linux router, packet forwarding for IPv4 has been enabled. After a reboot, the machine no longer forwards IP packets from other hosts. The command: echo 1 > /proc/sys/net/ipv4/ip_forward temporarily resolves this issue.

Which one of the following options is the best way to ensure this setting is saved across system restarts?

    Correct Answer: C

    To ensure that the setting is saved across system restarts on a Linux router, you need to make a persistent change in the system configuration files. Modifying /etc/sysctl.conf to include net.ipv4.ip_forward=1 is the correct approach, as this file is read and applied during system boot. This ensures that the packet forwarding setting persists across reboots.

Question 2 of 120

What information can be found in the file specified by the status parameter in an OpenVPN server configuration file? (Choose two.)

    Correct Answer: C, D

    The file specified by the status parameter in an OpenVPN server configuration file contains statistical information regarding the currently running OpenVPN daemon and a list of currently connected clients. This status file provides insights such as the number of bytes sent and received, the client connection duration, and the routing table used by the clients. Errors and warnings (option A) are typically found in the log file, not the status file. Routing information (option B) is relevant but is more specific to the data structures and operations internally handled by the OpenVPN process rather than what's explicitly written in the status file. A history of all clients who have connected (option E) would be stored in separate logs, not in the status file.

Question 3 of 120

Which of the following lines in the sshd configuration file should, if present, be changed in order to increase the security of the server? (Choose two.)

    Correct Answer: A, D

    To increase the security of the server, you should change these lines in the sshd configuration file if they are present: 'Protocol 2, 1' and 'PermitRootLogin yes'. The line 'Protocol 2, 1' allows the use of SSH protocol version 1, which is known to have security vulnerabilities; it should be set to 'Protocol 2' to only use the more secure version. The line 'PermitRootLogin yes' allows the root user to log in directly, which poses a significant security risk; it should be changed to 'PermitRootLogin no' to require users to log in as a regular user and then switch to root using sudo or su.

Question 4 of 120

Which of the following nmap parameters scans a target for open TCP ports? (Choose two.)

    Correct Answer: C, E

    The nmap parameters that scan a target for open TCP ports are -sT and -sS. The -sT option performs a TCP connect scan, while the -sS option performs a TCP SYN scan. Both of these options are used specifically to scan for open TCP ports. The other options, -sO, -sU, and -sZ, are used for different types of scans, such as IP protocol, UDP, and SCTP scans, respectively.

Question 5 of 120

Which of the statements below are correct regarding the following commands, which are executed on a Linux router? (Choose two.)

    Correct Answer: A, D

    The ip6tables commands provided are intended to manipulate the forwarding of IPv6 packets on a Linux router. The first rule drops any packets with a source address in the fe80::/64 range, and the second rule drops packets with a destination address in the same range. These addresses are link-local addresses typically used for communication within a single network segment and are not routed across multiple segments. Therefore, packets with fe80::/64 addresses should not typically appear in the FORWARD chain, making it accurate to say that such packets will not occur in the FORWARD chain. Additionally, the ip6tables commands are syntactically correct and will execute without producing errors or warnings, confirming that both commands will complete without errors.