Ensurepass

QUESTION 91

Which of the following is NOT included in a Snort rule header?

 

A.

protocol

B.

action

C.

source IP address

D.

packet byte offset

E.

source port

 

Correct Answer: D

 

 

QUESTION 92

Select the TWO correct statements about the following excerpt from httpd.conf:

 

<Directory /var/web/dir1>

<Files private.html>

Order allow, deny

Deny from all

</Files>

</Directory>

 

A.

The configuration will deny access to /var/web/dir1/private.html, /var/web/dirl/subdir2/private.html, /var/web/dirl/subdir3/private.html and any other instance of private.html found under the /var/web/dir1/directory.

B.

The configuration will deny access to /var/web/dir1/private.html, but it will allow access to /var/web/dirl/subdir2/private.htm1, for example.

C.

The configuration will allow access to any file named private.html under /var/web/dir1, but it will deny accessto any other files

D.

The configuration will allow access just to the file named private.html under /var/web/dir1

E.

The configuration will allow access to /var/web/private.html, if it exists

 

Correct Answer: AE

 

 

QUESTION 93

Which of the following lines in the Apache configuration file would allow only clients with a valid certificate to access the website?

 

A.

SSLCA conf/ca.crt

B.

AuthType ssl

C.

IfModule libexec/ssl.c

D.

SSLRequire

E.

SSLVerifyClient require

 

Correct Answer: E

 

 

QUESTION 94

Which of the following defines the maximum allowed article size in the configuration file for INN?

 

A.

limitartsize

B.

artsizelimit

C.

maxartlimit

D.

maxartsize

E.

setartlimit

 

Correct Answer: D

 

 

QUESTION 95

Some users are unable to connect to specific local hosts by name, while accessing hosts in other zones works as expected. Given that the hosts are reachable by their IP addresses, which is the default log file that could provide hints about the problem?

 

A.

/var/named/log

B.

/var/lib/named/dev/log

C.

/var/log/bind_errors

D.

/var/log/bind/errors

E.

/var/log/messages

 

Correct Answer: E

 

 

QUESTION 96

You suspect that you are receiving messages with a forged From: address. What could help you find out where the mail is originating?

 

A.

Install TCP wrappers, and log all connections on port 25

B.

A dd the command ‘FR-strlog’ to the sendmail.cf file

C.

Add the command ‘define (‘LOG_REAL_FROM’) dnl’ to the sendmail.mc file

D.

Run a filter in the aliases file that checks the originating address when mail arrives

E.

Look in the Received: and Message-ID: parts of the mail header

 

Correct Answer: E

 

 

QUESTION 97

What command would be used to configure the interface eth1:1 with the IP address 10 10.34 and the netmask 255.255.255.0?

 

A.

ifconfig eth1:1 10.10.3.4 netmask 255.255.255.0 start

B.

ifconfig 10.10.3.4 netmask 255.255.255.0 eth1:1 up

C.

ifconfig eth1:1 10.10.3.4 netmask 255.255.255.0 up

D.

ifconfig 10.10.3.4/255.255.255.0 eth1:1 up

E.

ifconfig eth1:1 10.10.3.4/255.255.255.0 up

 

Correct Answer: C

 

 

QUESTION 98

The new file server is a member of the Windows domain “foo”. Which TWO of the following configuration sections will allow members of the domain group “all” to read, write and execute files in “/srv/smb/data”?

 

A.

[data] comment = data share path = /srv/smb/data write list = @foo+all force group = @foo+all create mask= 0550 directory mask = 0770

B.

[data] comment = data share path = /srv/smb/data write list = @foo+all force group = @foo+all create mask= 0770 directory mask = 0770

C.

[data] path = /srv/smb/data write list = @foo+all force group = @foo+all create mask = 0770 directory mask= 0770

D.

[data] comment = data share path = /srv/smb/data write list = @foo+all force group = @foo+all directorymask = 0770

E.

[data] comment = data share path = /srv/smb/data write list = @foo+all force group = all create mask = 0550directory mask = 0770

 

Correct Answer: BC

 

 

QUESTION 99

Which environment variables are used by ssh-agent? (Please select TWO variables)

 

A.

SSH_AGENT_KEY

B.

SSH_AGENT_SOCK

C.

SSH_AGENT_PID

D.

SSH_AUTH_SOCK

E.

SSH_AUTH_PID

 

Correct Answer: BC

 

 

QUESTION 100

Which TWO of the following statements about the tcp_wrappers configuration fil
es are correct?

 

A.

Both files must be edited, to get tcp_wrappers to work properly

B.

It is possible to configure tcp_wrappers using just one file

C.

(x) inetd requires these files

D.

All programs that provide network services use these files to control access

E.

tcpd uses these files to control access to network services

 

Correct Answer: BE

 

Free VCE & PDF File for LPI 117-202 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.