What does the following procmail configuration section do?
* < 256000
A. procmail sends all email older than 256000 seconds to the external program foo
B. If an email contains a value less than 256000 anywhere within it, procmail will process the email with theprogram foo
C. procmail sends mail containing less than 256000 words to program foo
D. The program foo is used instead of procmail for all emails larger than 256000 Bytes
E. If the email smaller than 256000 Bytes, procmail will process it with the program foo
Which setting in the Courier IMAP configuration file will tell the IMAP daemon to only listen on the localhost interface?
B. Listen 127.0.0.1
You suspect that you are receiving messages with a forged From: address. What could help you find out where the mail is originating?
A. Install TCP wrappers, and log all connections on port 25
B. A dd the command ‘FR-strlog’ to the sendmail.cf file
C. Add the command ‘define (‘LOG_REAL_FROM’) dnl’ to the sendmail.mc file
D. Run a filter in the aliases file that checks the originating address when mail arrives
E. Look in the Received: and Message-ID: parts of the mail header
You have to mount the /data filesystem from an NFS server(srvl) that does not support locking. Which of the following mount commands should you use?
A. mount -a -t nfs
B. mount -o locking=off srvl:/data /mnt/data
C. mount -o nolocking srvl:/data /mnt/data
D. mount -o nolock srvl:/data /mnt/data
E. mount -o nolock /data@srvl /mn/data
In what mode is your FTP session when the client side makes the connections to both the data and command ports of the FTP server?
Which of the following organisations track and report on security related flaws in computer technology? (Please select TWO answers)
Which of the following Linux services has support for only the Routing Information Protocol (RIP) routing protocol?
Which of the following is NOT included in a Snort rule header?
C. source IP address
D. packet byte offset
E. source port
Which environment variables are used by ssh-agent? (Please select TWO variables)
What tool scans log files for unsuccessful login attempts and blocks the offending IP addresses with firewall rules?
Download Latest LPI 117-202 Real Free Tests , help you to pass exam 100%.