LPIC-2 Test Examen 202

Preguntas de repaso del módulo LPI-202 para la certificación LPIC-2.

Which of the following rules based scripting languages is commonly used with Postfix and Dovecot email servers?

By default, when you generate SSH public and private keys, they use what type of encryption?

Which of the following are mail agents? (Check all that apply.) Choose the 3 correct answers:

MSA es el acrónimo de Mail Submission Agent

The PAM module called 'pam_unix.so' is often used to apply external rules to what kind of authentication?

Which Postfix mail server utility will allow you to display ONLY custom configuration settings on your mail server?

Which of the following Apache configuration directives determines the limit on the number of web clients that can access the site at any one time?

In the '/etc/named.conf' DNS server configuration file, which of the following are valid directives? (Choose all that apply.) Choose the 3 correct answers:

Once you have created the /etc/aliases file for your email server, what do you have to do before the contents are active in your configuration?

Which of the following does the /etc/nsswitch.conf file determine the order of authentication types for? (Choose all that apply.) Choose the 3 correct answers:

Which of the following SAMBA utilities will show the status of the service along with connections and shares that are being actively shared?

The amount of time that a DNS record can be cached is configured on your server with what setting?

The 'rndc-confgen' utility can be used to create a default (initial) configuration file for the 'rndc' utility with what command?

When creating a configuration file to load the PHP module, which directive will actually call the appropriate module for inclusion?

Which of the following OpenLDAP utilities will allow you to modify a user's password in your organization?

Within the DHCP configuration file at /etc/dhcpd.conf, which directive section defines the network and range of IPs that will be provided on client request?

Which of the following options, when used in the /etc/fstab file for mounting an NFS share, will keep the system from waiting for the mount to succeed when accessing a remote system that is taking time to respond?

Which of the following record types in a DNS zone file identifies a mail server?

Which of the following PAM authentication modules is used to modify how passwords are changed on the system?

To isolate the DNS server process so that it does not have access to other system files or services, you would create what configuration type to place it within?

When using the 'doveconf' utility to display your configuration in more 'human readable' format, which command line parameter will show all settings and their current values?

Which of the following external configuration files would define the appropriate SSL settings to enable TLS for your mail server?

Within the primary Apache configuration file (which could be apache2.conf or httpd.conf, depending on version and distribution), which of the following directives defines the server's configuration directory?

Which of the following SSH utilities will allow you to copy files from your host to a remote host over an encrypted connection?

Which OpenLDAP configuration file contains the basic schemas that are necessary to create a directory server?

Which of the following SSH utilities will allow you to create a public and private key to exchange with other servers for user authentication?

All zone files are stored in this directory (default configuration):

An 'alias' in a DNS zone is defined as what kind of record?

Which of the following VirtualHost headers would indicate an IP based virtual host definition in an Apache Web Server?

Which of the following directives in a DHCP configuration file will define the name server(s) that are to be provided to the client when the IP assignment is made?

Which NFS export setting, when added to a share in the /etc/exports file, will prevent the client's root user from having root level access to the server's shared files and directories?

What is the default location directory for the Apache server access and error logs?

When creating a SAMBA credentials file to abstract authentication credentials during a client share mount, which parameters have to be included?

Which of the following log file locations will contain client and server DHCP messages in a Red Hat/CentOS-based distribution?

Which of the following directories contains all of the externally referenced Dovecot configuration files?

Which of the following is an IPTABLES firewall NOT responsible for?

When configuring your NFS server, which service, once installed, provides the portmap functionality for client access?

Which of the following IP ranges are private networks (not publicly routable)? (Check all that apply.) Choose the 2 correct answers:

When working within the Postfix main configuration file, what setting would you typically find (or place) in the 'myorigin' directive?

Which of the following files is the primary SAMBA configuration file?

The DNS 'root servers' are defined in which of the following files?

Which of these locations is the default file for the IPTABLES persistent rules?

When using the 'openssl-perl' package to generate SSL keys, signing requests and certificates, which of the following represents the proper order of options that will leave you with a self-signed SSL certificate?

Which of the following provides a subscription based mailing list with a variety of security announcements around exploits, vulnerabilities and mitigation strategies?

Which command(s) would enable your Linux server to function as a router on your network? (Check all that apply)? Choose the 2 correct answers:

Which of the following lines would indicate a base distinguished name?

Which of the following file system types, when used in conjunction with the 'mount' command or within the /etc/fstab file, allow you to mount a SAMBA share?

Which of the following utilities is used for applying filter rules to emails before they are delivered to a client? (Choose all that apply.)

When using many of the OpenLDAP utilities (ldapadd, ldapdelete, etc), which command line parameters is used to indicate simple authentication?

Which of the following methods are valid SSH connection strings? (Choose all that apply.)

Which of the following commands would enable NAT on your IPTABLES firewall where the network interface assigned to the internal network is called 'eth1'?

Which of the following SAMBA utilities will read and test your server share configuration for errors and display available shares?

Which of the following examples of an Nginx configuration would result in the ability of Nginx to answer a request by forwarding it to another URI?

Which of the following libraries does portmap use in conjunction with NFS to determine which client IPs have access to or are denied access to the NFS service?

Which of the following is NOT a filter point in an IPTABLES firewall?

Which of the following are legacy mail servers (similar in function to Postfix)? (Check all that apply.) Choose the 2 correct answers:

When enabling an SSL Certificate within a virtual host, which of the following directives is required to enable SSL in general?

Which of the following are valid settings within the client DNS configuration file /etc/resolv.conf (Choose All That Apply)? Choose the 2 correct answers:

When using the 'ldapadd' command to add a record to an OpenLDAP organization, which parameter would provide the 'rootdn' or admin account information?

Which of the following Dovecot mail utilities can be used to view the configuration of your mail server?

A 'name based' virtual host configuration is used in the Apache web server where ¿?¿?¿?¿?

Which of the following modules is the correct module to reference when enabling Perl CGI functionality in your Apache web server configuration?

Which parameter, when used with the SAMBA client utility 'smbclient', will allow you to connect as a user other than the one you are logged in as?

When using 'slapcat' to display the contents of your OpenLDAP directory, what format is the output provided in?

The Apache utility 'htpasswd' is used to create a secure file that contains a list of users that are granted to certain site resources (files or directories).

An alternative to the 'htpasswd' configuration for site authentication and access is the creation of a local .htaccess file in the protected directory.

The DHCP utility called 'dhcrelay' allows a server on another network segment to forward DHCP client requests to a defined DHCP server not on that same network.

The DNS term 'SOA' stands for 'Start of Authority'.

OpenLDAP can be considered a distributed directory service.

The SAMBA protocol allows you to share directory content with both Linux and Windows clients.

OpenVAS is a service and logging utility that can provide reporting on known security vulnerabilities.

DHCP stands for Dynamic Host Configuration Protocol.

The /etc/postfix/virtual file contains users and addresses to redirect email to using virtual destinations.

CERT stands for Computer Emergency Response Team.

The default content directory for the Apache web server is /var/www.

POP stands for Post Office Protocol.

When enabling SSL certificate within the Apache web server configuration, both the 'SSLCertificateKeyFile and SSLCertificateFile' are required directives.

Each zone that a DNS server is going to be authoritative for must be referenced in the 'named.localhost' file in /var/named directory.

The OpenSSL server is required to generate SSL certificates, keys and signing requests.

The VSFTPD service offers user management with both a PAM module as well as a service configuration setting.

The Nginx server can function as a reverse proxy, load balancer and traditional HTTP server.

DNS stands for Dynamic Name Service.

The command 'host www.cnn.com 8.8.8.8' will use the DNS Server at address '8.8.8.8' to lookup the domain 'www.cnn.com' rather than the locally configured DNS server in /etc/resolv.conf.

The network range 192.168.0.0 through 192.168.255.255 is a private network range that is not publicly routable.

Squid is an example of a forward proxy server (only).

A 'Split Server' configuration for DNS refers to a multiple DNS server setup where one server functions as an internal DNS server (private domain requests) and another functions as an external DNS server (public domain requests only).

The 'courier' email server is able to provide SMTP, POP, IMAP, LDAP, SSL and HTTP functions all in the same package.

IMAP stands for Internet Mail Aggregation Protocol.

What is a significant difference between host and zone keys generated by dnssec-keygen?

According to the configuration below, what is the e-mail address of the administrator for this domain?

$TTL 86400
$ORIGIN certkiller.com
@ IN SOA mars.certkiller.com hostmaster.certkiller.com (
2005050801
10800
3600
604800
86400)

Which of these would be the simplest way to configure BIND to return a different version number to queries?

According to the configuration below:

options {
  directory "/var/named";
  allow-query { any; };
  allow-recursion { 127.0.0.1; 10.0.0.0/24; };
  forwarders { 192.168.0.4; };
  forward firs;
};

zone "." {
  type hint;
  file "named.ca";
};

DNSSEC is used for?

Using only commands included with named, what is the command, with options or parameters, to make named re-read its zone files? (Correct Text)

Which type of DNS record defines which server(s) email for a domain should be sent to?

Some users are unable to connect to specific local hosts by name, while accessing hosts in other zones works as expected. Given that the hosts are reachable by their IP addresses, which is the default log file that could provide hints about the problem?

A BIND server should never answer queries from certain networks or hosts. Which configuration directive could be used for this purpose?

What is the purpose of a PTR record?

Performing a DNS lookup with dig results in this answer: What might be wrong in the zone definition?

;;Question SECTION:
;5.123.168.192.in-addr.arpa. IN PTR

;; ANSWER SECTION:
5.123.168.192.in-addr.arpa. 600 IN PTR linuserv.example.net.123.168.192.in-addr.arpa.

;;AUTHORITY SECTION:
123.168.192.in-addr.arpa. 600 IN NS linuserv.example.net.

;; ADDITIONAL SECTION:
linuserv.example.net. 600 IN A 192.168.123.5

What directive can be used in named.conf to restrict zone transfers to the 192.168.1.0/24 network?

To securely use dynamic DNS updates, the use of TSIG is recommended. Which TWO statements about TSIG are true?

The users of the local network complain that name resolution is not fast enough. Enter the command, without the path or any options, that shows the time taken to resolve a DNS query.

A DNS server has the IP address 192.168.0.1. Which TWO of the following need to be done on a client machine to use this DNS server?

La opción 3 no puede ser correcta ya que estamos poniendo una IP que no corresponde con el servidor DNS de la pregunta

Which port must be open on a firewall, to allow a DNS server to receive queries? (Enter only the port number).

There is a restricted area in an Apache site, which requires users to authenticate against the file /srv/www/security/site-passwd. Which command is used to CHANGE the password of existing users, without losing data, when Basic authentication is being used.

Consider the following / srv/www/ default/html/ restricted/.htaccess

AuthType Basic
AuthUserFile / srv/www/ security/ site-passwd
AuthName Restricted
Require valid-user
Order deny,allow
Deny from all
Allow from 10.1.2.0/24
Satisfy any

Considering that DocumentRoot is set to /srv/www/default/html, which TWO of the following sentences are true?

A web server is expected to handle approximately 200 simultaneous requests during normal use with an occasional spike in activity and is performing slowly. Which directives in httpd.conf need to be adjusted?

Which statements about the Alias and Redirect directives in Apache's configuration file are true?

Which file, in the local file-system, is presented when the client requests http://server/~joe/index.html and the following directive is present in server's Apache configuration file?

UserDir site/html

Given that all users have their home directory in /home, please type in the FULL file name including the path.

When Apache is configured to use name-based virtual hosts:

Enter one of the Apache configuration file directives that defines where log files are stored.

Which Apache directive is used to configure the main directory for the site, out of which it will serve documents?

Which Apache directive allows the use of external configuration files defined by the directive AccessFileName?

Which of the following is recommended to reduce Squid's consumption of disk resources?

Which ACL type in Squid's configuration file is used for authentication purposes?

The listing below is an excerpt from a Squid configuration file:

[...]
acl all src 0.0.0.0/0.0.0.0
acl manager proto cache_object
acl localhost src 127.0.0.1/255.255.255.255
acl to_localhost dst 127.0.0.0/8
acl SSL_ports port 443
acl Safe_ports port 80 443 1025-65535
acl CONNECT method CONNECT
acl localhost src 10.0.0.0/24

http_access allow manager localhost
http_access deny manager
http_access deny !Safe_ports
http_access deny CONNECT !SSL_ports
http_access allow localnet
[...]

In the file /var/squid/url_blacklist is a list of URLs that users should not be allowed to access. What is the correct entry in Squid's configuration file to create an acl named blacklist based on this file?

Users in the acl named 'sales_net' must only be allowed to access to the Internet at times specified in the time_acl named 'sales_time'. Which is the correct http_access directive, to configure this?

With which parameter in the smb.conf file can a share be hidden?

Which TWO of the following options are valid, in the /etc/exports file?

nfsd, portmap and ¿?¿?¿?¿?¿? daemons must be running on an NFS server.

Which of the following is needed, to synchronize the Unix password with the SMB password, when the encrypted SMB password in the smbpasswd file is changed?

What command can be used to check the Samba configuration file?

The new file server is a member of the Windows domain “foo”. Which TWO of the following configuration sections will allow members of the domain group “all” to read, write and execute files in “/srv/smb/data”?

Which command can be used to list all exported file systems from a remote NFS server:

Which of the following configuration lines will export /usr/local/share/ to nfsclient with read-write access, ensuring that all changes are straight to the disk?

Which Samba-related command will show all options that were not modified using smb.conf and thus are set to their default values? Please enter the command and its parameter(s):

After changing /etc/exports on a server, remote hosts are still unable to mount the exported directories. What should be the next action?

Which directive in the OpenVPN client.conf specifies the remote server and port that the client should connect to? (Provide only the directive, without any options or parameters)

Which of the following are valid OpenVPN authentication modes? (Choose TWO correct answers)

What is the default UDP port for OpenVPN traffic?

In which of the following scenarios MUST an administrator use ethernet bridging instead of routing when configuring an OpenVPN sites? (Select TWO correct answers)

Which of the following lines in the OpenVPN server.conf file will supply a DNS server for DHCP clients to use?

What information can be found in the log file specified by the status parameter in OpenVPN's server.conf? (Select TWO correct answers)

What types of virtual network devices does OpenVPN use for connections? (Choose TWO corrects answers.)

What is the name of the network security scanner project which, at the core, is a server with a set of network vulnerability tests (NVTs)?

An administrator has just configured an OpenVPN client. Upon starting the service, the following message is displayed: TLS Error: TLS key negotiation failed to occur witnin 60 seconds. Which of the following statements is true?

The following is an excerpt from a procmail configuration file:

:0 c
* ! ^To: backup
! backup

Which of the following is correct?

Which TWO /etc/hosts.allow entries will allow access to sshd from the class C network 192.168.1.0?

According to the dhcpd.conf file below, which domain name will clients in the 172.16.87.0/24 network get?

default-lease-time 1800;
max-lease-time 7200;
option domain-name “certkiller.com”;

subnet 172.16.87.0 netmask 255.255.255.0 {
range 172.16.87.128 172.16.87.254;
option broadcast-address 172.16.87.255;
option domain-name-servers 172.16.87.1;
option domain-name “lab.certkiller.com”;
}
subnet 172.16.88.0 netmask 255.255.255.0 {
range 172.16.88.128 172.16.88.254;
option broadcast-address 172.16.88.255;
option domain-name-servers 172.16.88.1;
}

Which of the following sentences is true about ISC DHCP?

The host, called “ Certkiller ”, with the MAC address “08:00:2b:4c:59:23”, should always be given the IP address of 192.168.1.2 by the DHCP server. Which of the following configurations will achieve this?

Which dhcpd.conf option defines the DNS server address(es) to be sent to the DHCP clients?

A malicious user has sent a 35MB video clip, as an attachment, to hundreds of recipients. Looking in the outbound queue reveals that this is the only mail there. This mail can be removed with the command rm ¿?¿?¿?* . Complete the path below.

The syntax of the procmail configuration file is?

What is the missing keyword in the following configuration sample for dovecot which defines which authentication types to support? (Specify only the keywork)

auth default {
______ = plain login cram-md5
}

A procmail recipe is required to delete all emails marked as spam. Please complete the recipe.

:0:
* X-Spam-Status: Yes

Where is the user foo's procmail configuration stored, if home directories are stored in /home? Please enter the complete path to the file.

On a newly-installed mail server with the IP address 10.10.10.1, ONLY local networks should be able to send email. How can the configuration be tested, using telnet, from outside the local network?

What is the path to the global postfix configuration file? (Please specify the complete directory path and file name)

What security precautions must be taken when creating a directory into which files can be uploaded anonymously using FTP?

What is the correct format for an ftpusers file entry?

A security-conscious administrator would change which TWO of the following lines found in an SSH configuration file?

A system monitoring service checks the availability of a database server on port 5432 of destination.example.com. The problem with this is that the password will be sent in clear text. When using an SSH tunnel to solve the problem, which command should be used?

What must be done on a host to allow a user to log in to that host using an SSH key?

What command must be used to create an SSH key-pair? Please enter the command without the path or any options or parameters.

To allow X connections to be forwarded from or through an SSH server, what line must exist in the sshd configuration file?

A network client has an ethernet interface configured with an IP address in the subnet 192.168.0.0/24. This subnet has a router, with the IP address 192.168.0.1, that connects this subnet to the Internet. What needs to be done on the client to enable it to use the router as its default gateway?

A server with 2 network interfaces, eth0 and eth1, should act as a router. eth0 has the IP address 192.168.0.1 in the subnet 192.168.0.1/24 and eth1 has the IP address 10.0.0.1 in the subnet 10.0.0.0/16. The routing table looks fine, but no data is traversing the networks. Which TWO of the following need to be done?

Which of the following sentences is true, when using the following /etc/pam.d/login file?

#%PAM-l.0
auth required /lib/security/pam_securetty.so
auth required /lib/security/pam_nologin.so
auth sufficient /lib/security/pam_unix.so shadow nullok md5 use_authtok
auth required /lib/security/pam_ldap.so use_first_pass
account sufficient /lib/security/pam_unix.so
account required /lib/security/pam_ldap.so
password required /lib/security/pam_cracklib.so
password sufficient /lib/security/pam_unix.so nullok use_authtok md5 shadow
password required /lib/security/pam_ldap.so use_first_pass
session optional /lib/security/pam_console.so
session sufficient /lib/security/pam_unix.so
session required /lib/security/pam_ldap.so

LDAP-based authentication against a newly-installed LDAP server does not work as expected. The file /etc/pam.d/login includes the following configuration parameters. Which of them is NOT correct?

What is the advantage of using SASL authentication with OpenLDAP?

In which directory are the PAM modules stored?

Which of the following is true, when a server uses PAM authentication and both /etc/pam.conf & /etc/pam.d/ exist?

To configure an LDAP service in the company “ Certkiller Ltd”, which of the following entries should be added to slapd.conf, in the Database Directives section, to set the rootdn so that the common name is Manager and the company's domain is Certkiller .

Which command can be used to change the password for an LDAP entry?

To be able to access the server with the IP address 10.12.34.56 using HTTPS, a rule for iptables has to be written. Given that the client host's IP address is 192.168.43.12, which of the following commands is correct?

What tool scans log files for unsuccessful login attempts and blocks the offending IP addresses with firewall rules?

A user requests a “hidden” Samba share, named confidential, similar to the Windows Administration Share. How can this be configured?

How must Samba be configured such that it can check CIFS passwords against those found in /etc/passwd and /etc/shadow?

In a BIND zone file, what does the @ character indicate?

In order to protect a directory on an Apache HTTPD web server with a password, this configuration was added to an .htaccess file in the respective directory:

AuthType Basic
AuthName "Protected Directory"
AuthUserFile /var/www/dir/.htpasswd
Require valid-user

Furthermore, a file /var/www/dir/.htpasswd was created with the following content: usera:S3cr3t

Given that all these files were correctly processed by the web server processes, which of the following statements is true about requests to the directory?

In which CIFS share must printer drivers be placed to allow Point’n’Print driver deployment on Windows?

The content of which local file has to be transmitted to a remote SSH server in order to be able to log into the remote server using SSH keys?

Creo que la solución no es la correcta ya que habla del fichero del cliente y authorized_keys está en el servidor destino. La respuesta correcta debería ser la primera.

The program vsftpd, running in a chroot jail, gives the following error:

/bin/vsftpd: error while loading shared libraries: libc.so.6: cannot open shared object file:

No such file or directory

Which of the following actions would fix the error?

What option for BIND is required in the global options to disable recursive queries on the DNS server by default?

What option in the client configuration file would tell OpenVPN to use a dynamic source port when making a connection to a peer?

In response to a certificate signing request, a certification authority sent a web server certificate along with the certificate of an intermediate certification authority that signed the web server certificate. What should be done with the intermediate certificate in order to use the web server certificate with Apache HTTPD?

What word is missing from the following excerpt of a named.conf file?

__________ friends {
    10.10.0.0/24; 192.168.1.0/24;
};

options {
    allow-query { friends; };
}

When the default policy for the netfilter INPUT chain is set to DROP, why should a rule allowing traffic to localhost exist?

When using mod_authz_core, which of the following strings can be used as an argument to Require in an Apache HTTPD configuration file to specify the authentication provider? (Choose three.)

Which Apache HTTPD directive enables HTTPS protocol support?

Which BIND option should be used to limit the IP addresses from which slave name servers may connect?

Which command is used to configure which file systems a NFS server makes available to clients?

Which global option in squid.conf sets the port number or numbers that Squid will use to listen for client requests?

Which http_access directive for Squid allows users in the ACL named sales_net to only access the Internet at times specified in the time_acl named sales_time?

Which Linux user is used by vsftpd to perform file system operations for anonymous FTP users?

Which of the following DNS records could be a glue record?

Which of the following lines in the sshd configuration file should, if present, be changed in order to increase the security of the server? (Choose two.)

Which of the following nmap parameters scans a target for open TCP ports? (Choose two.)

Which of the following Samba configuration parameters is functionally identical to the parameter read only=yes?

Which of the following Samba services handles the membership of a file server in an Active Directory domain?

Which of the following sshd configuration should be set to no in order to fully disable password based logins? (Choose two.)

Which of the following statements is true regarding the NFSv4 pseudo file system on the NFS server?

Which of the statements below are correct regarding the following commands, which are executed on a Linux router? (Choose two.)

Ip6tables -A FORWARD -s fe80::/64 -j DROP

p6tables -A FORWARD -d fe80::/64 -j DROP

Which of these tools, without any options, provides the most information when performing DNS queries?

On a Linux router, packet forwarding for IPv4 has been enabled. After a reboot, the machine no longer forwards IP packets from other hosts. The command: echo 1 > /proc/sys/net/ipv4/ip_forward temporarily resolves this issue. Which one of the following options is the best way to ensure this setting is saved across system restarts?

Which tool creates a Certificate Signing Request (CSR) for serving HTTPS with Apache HTTPD?

With fail2ban, what is a ‘jail’?

Which directive in a Nginx server configuration block defines the TCP ports on which the virtual host will be available, and which protocols it will use? (Specify ONLY the option name without any values.)

A company is transitioning to a new DNS domain name and wants to accept e-mail for both domains for all of its users on a Postfix server.

After the installation of Dovecot, it is observed that the dovecot processes are shown in ps ax like this:

31248 ?    S    0:00 dovecot/imap
31253 ?    S    0:00 dovecot/imap-login

In order to associate the processes with users and peers, the username, IP address of the peer and the connection status, which of the following options must be set?

For what purpose is TCP/IP stack fingerprinting used by nmap?

Given the following Squid configuration excerpt:

cache_dir ufs /var/spool/squid3/ 1024 16 256

Which of the following directories will exist directly within the directory: /var/spool/squid3/? (Choose two.)

How is the LDAP administrator account configured when the rootdn and rootpw directives are not present in the slapd.conf file?

If there is no access directive, what is the default setting for OpenLDAP?

access to *
    by anonymous write
    by *         read

Solución:

access to *
    by anonymous none
    by *         read
access to *
    by *         read
access to *
    by anonymous auth
    by *         read

In a PAM configuration file, which of the following is true about the required control flag?

In order to join a file server to the Active Directory domain intra.example.com, the following smb.conf has been created:

[global]
    workgroup = intra.example.com
    netbios name = Fileserver
    server role = member server
    idmap config * : backend = tdb
    idmap config * : range = 10000-199999
    winbind enum users = yes
    winbind enum group = yes

The command net ads join raises an error and the server is not joined to the domain. What should be done to successfully join the domain?

Active Directory domains.

It has been discovered that the company mail server is configured as an open relay. Which of the following actions would help prevent the mail server from being used as an open relay while maintaining the possibility to receive company mails? (Choose two.)

Select the Samba option below that should be used if the main intention is to setup a guest printer service?

The following Apache HTTPD configuration has been set up to create a virtual host available at www.example.com and www2.example.com:

<VirtualHost *:80>
    ServerName www.example.com
    ServerName www2.example.com
    ServerAdmin webmaster@example.com
    DocumentRoot /var/www/
    <Directory /srv/www/>
        Require all granted
    </Directory>
</VirtualHost>

Even though Apache HTTPD correctly processed the configuration file, requests to both names are not handled correctly. What should be changed in order to ensure correct operations?

The Samba configuration file contains the following lines:

host allow = 192.168.1.100 192.168.2.0/255.255.255.0 localhost
host deny = 192.168.2.31
interfaces = 192.168.1.0/255.255.255.0 192.168.2.0/255.255.255.0

A workstation is on the wired network with an IP address of 192.168.1.177 but is unable to access the Samba server. A wireless laptop with an IP address 192.168.2.93 can access the Samba server. Additional trouble shooting shows that almost every machine on the wired network is unable to access the Samba server. Which alternate host allow declaration will permit wired workstations to connect to the Samba server without denying access to anyone else?

There is a restricted area in a site hosted by Apache HTTPD, which requires users to authenticate against the file /srv/www/security/sitepasswd. Which command is used to CHANGE the password of existing users, without losing data, when Basic authentication is being used?

Creo que la correcta debería ser la tercera ya que la opción -c sería para añadir un usuario que no existía.

What does the samba-tool testparm command confirm regarding the Samba configuration?

When are Sieve filters usually applied to an email?

When trying to reverse proxy a web server through Nginx, what keyword is missing from the following configuration sample?

location / {
     ____ http://proxiedserver:8080;
}

Which Apache HTTPD configuration directive is used to specify the method of authentication, e.g. None or Basic?

Which Apache HTTPD configuration directive specifies the RSA private key that was used in the generation of the SSL certificate for the server?

Which keyword is used in the Squid configuration to define networks and times used to limit access to the service?

Which of the following actions synchronizes UNIX passwords with the Samba passwords when the encrypted Samba password is changed using smbpasswd?

Which of the following are logging directives in Apache HTTPD? (Choose two.)

Which of the following authentication mechanisms are supported by Dovecot? (Choose three.)

Which of the following information has to be submitted to a certification authority in order to request a web server certificate?

Which of the following PAM modules allows the system administrator to use an arbitrary file containing a list of user and group names with restrictions on the system resources available to them?

Which of the following services belongs to NFSv4 and does not exist in NFSv3?

Which of the following statements are true regarding Server Name Indication (SNI)? (Choose two.)

Which of the following statements in the ISC DHCPD configuration is used to specify whether or not an address pool can be used by nodes which have a corresponding host section in the configuration?

Which option within a Nginx server configuration section defines the file system path from which the content of the server is retrieved?

Which Postfix command can be used to rebuild all of the alias database files with a single invocation and without the need for any command line arguments?

With Nginx, which of the following directives is used to proxy requests to a FastCGI application?

According to this LDIF excerpt, which organizational unit is Robert Smith part of? (Specify only the organizational unit.)

dn: cn=Robert Smith, ou=people, dc=example, dc=com
objectclass: inetOrgPerson
cn: Robert Smith
cn: Robert J Smith
cn: bob smith
sn: smith
uid: rjsmith
userpassword: rJsmitH
carlicense: HISCAR 123
homephone: 555-111-2222
mail: r.smith@example.com
mail: rsmith@example.com
mail: bob.smith@example.com
description: swell guy

In order to export /usr and /bin via NFSv4, /exports was created and contains working bind mounts to /usr and /bin. The following lines are added to /etc/exports on the NFC server:

/exports     192.0.1.0/24 (rw, sync, fsid=0, crossmnt, no_subtree_check)
/exports/usr 192.0.2.0/24 (rw, sync, fsid=0, crossmnt, no_subtree_check)
/exports/bin 192.0.2.0/24 (rw, sync, fsid=0, crossmnt, no_subtree_check)

After running mount -t nfsv4 server:/ /mnt of an NFC-Client, it is observed that /mnt contains the content of the server’s /usr directory instead of the content of the NFSv4 foot folder. Which option in /etc/exports has to be changed or removed in order to make the NFSv4 root folder appear when mounting the highest level of the server? (Specify ONLY the option name without any values or parameters.)

In order to specify alterations to an LDAP entry, what keyword is missing from the following LDIF file excerpt?

dn: cn=Some Person, dc=example, dc=com
changetype: ______
...

Specify the keyword only and no other information.

What command displays NFC kernel statistics? (Specify ONLY the command without any path or parameters.)

What is the name of the root element of the LDAP tree holding the configuration of an OpenLDAP server that is using directory based configuration? (Specify ONLY the element’s name without any additional information.)

What is the path to the global Postfix configuration file? (Specify the full name of the file, including path.)

Which action in a Sieve filter forwards a message to another email address without changing the message? (Specify ONLY the action’s name without any parameters.)

How are PAM modules organized and stored?

A BIND server should be upgraded to use TSIG. Which configuration parameters should be added if the server should use the algorithm hmac-md5 and the key skrKc4DoTzi/takIlPi7JZA==?

key.server.example.com. {
    algorithm=hmac-md5;
    secret="skrKc4DoTzi/takIlPi7JZA==";
};

Solución:

key.server.example.com. {
    algorithm hmac-md5;
    secret "skrKc4DoTzi/takIlPi7JZA==";
};
key.server.example.com. {
    algorithm hmac-md5;
    secret skrKc4DoTzi/takIlPi7JZA==;
};
TISG server.example.com. {
    algorithm hmac-md5;
    secret  "skrKc4DoTzi/takIlPi7JZA==";
};
key.server.example.com. 
    algorithm=hmac-md5;
    secret="skrKc4DoTzi/takIlPi7JZA==";

A zone file contains the following lines:

$ORIGIN example.com
host2.example.org. IN A 198.51.100.102

and is included in the BIND configuration using this configuration stanza:

zone "example.com"{
    type master;
    file "db.example.com";
};

Which problem is contained in this configuration?

After running ssh-keygen and accepting the default values, which of the following files are changed or created? (Choose two.)

In the main Postfix configuration file, how are service definitions continued on the next line?

Para poder continuar escribiendo la definición de un parámetro en la siguiente línea, esta nueva línea debe empezar con un espacio en blanco (ya sea una tabulación o un espacio). Decimos entonces que continúa una línea lógica, a diferencia de una línea normal. Ejemplo de una línea lógica:

mydestination = mail.example.com, localhost.example.com, 
 localhost

Select the alternative that shows the correct way to disable a user login for all users except root.

To allow X connections to be forwarded from or through an SSH server, what configuration keyword must be set to yes in the sshd configuration file?

To which destination will a route appear in the Linux routing table after activating IPv6 on a router’s network interface, even when no global IPv6 addresses have been assigned to the interface?

Es lo que correspondería en IPv4 a las direcciones de 169.254.1.0 hasta 169.254.254.255 (lo que Microsoft llama APIPA). Este tipo de direcciones se denominan direcciones de enlace-local y se emplean cuando no existe ningún mecanismo de asignación de dirección (DHCP, por ejemplo) o ha fallado.

Using its standard configuration, how does fail2ban block offending SSH clients?

Revisar esta respuesta porque se supone que fail2ban solo actualiza reglas en el firewall (iptables) para bloquear esos intentos y no hace nada en la configuración del servidor SSH.

What is the name of the Dovecot configuration variable that specifies the location of user mail?

What is the purpose of DANE?

What is the standard port used by OpenVPN?

Which command is used to administer IPv6 netfilter rules?

Which configuration parameter on a Postfix server modifies only the sender address and not the recipient address?

Which FTP names are recognized as anonymous users in vsftp when the option anonymous_enable is set to yes in the configuration files? (Choose two.)

Which netfilter table contains built-in chains called INPUT, OUTPUT and FORWARD?

Which of the following actions are available in Sieve core filters? (Choose three.)

Según el manual, la respuesta correcta sería fileinto, discard y reject

Which of the following commands can be used to connect and interact with remote TCP network services? (Choose two)

Which of the following commands displays an overview of the Postfix queue content to help identify remote sites that are causing excessive mail traffic?

qshape se incluye con la instalación de Postfix y sirve para ver el tiempo que lleva un correo en una cola determinada.

Which of the following DNS record types is used for reverse DNS queries?

Which of the following is correct about this excerpt from an LDIF file?

dn: cn=PrintOperators,ou=Groups,o=IT,DC=mycompany,DC=example,DC=com

Which of the following lines is valid in a configuration file in /etc/pam.d/?

Which of the following OpenVPN configuration options makes OpenVPN forward network packets between VPN clients itself instead of passing the packets on to the Linux host which runs the OpenVPN server for further processing?

Which of the following PAM modules sets and unsets environment variables?

Which of the following statements allow the logical combinations of conditions in Sieve filters? (Choose two.)

or no aparece en el manual. Creo que las respuestas correctas deberían ser allof y anyof

Which of the following statements is INCORRECT regarding the LDIF file format?

Normalmente debe estar codificado en UTF-8

Which of the following types of IPv6 address assignments does DHCPv6 support? (Choose three.)

Which of the following values can be used in the OpenLDAP attribute olcBackend for any object of the class olcBackendConfig to specify a backend? (Choose three.)

De acuerdo a la documentación de la versión 2.4 de OpenLDAP, la respuesta correcta sería ldap, passwd y bdb (aunque este último ya dejó de soportarse)

Which of these sets of entries does the following command return?

ldapsearch -x "(|(cn=marie) (!(telephoneNumber=9*)))"

Creo que la respuesta no es correcta. El operador | funciona como un OR y ! como una negación, así que lo que parece que se está buscando es un cn que sea marie o que el objeto tenga un número de teléfono que no empiece por 9. Por tanto, la respuesta correcta debería ser la tercera.

Which of these tools provides DNS information in the following format?

www.example.com has address 93.184.216.34
www.example.com has IPv6 address 2606:2800:220:1:248:1893:25c8:1946

Which option in allowed-hosts specifies which host are permitted to ask for domain name information from the server?

Which option within the ISC DHCPD configuration file defines the IPv4 DNS server address(es) to be sent to the DHCP clients?

Which rdnc sub command can be used in conjunction with the name of a zone in order to make BIND reread the content of the specific zone file without reloading other zones as well?

Las soluciones creo que son incorrectas. De hecho, no son comandos de rndc. La respuesta correcta debería ser reload zone.

Which attitude of an object in LDAP defines which other attributes can be set for the object? (Specify ONLY the attribute name without any values.)

Which doveadm sub-command displays a list of connections of Dovecot in the following format? (Specify ONLY the command without any parameters.)

Which option in the Postfix configuration makes Postfix pass email to external destinations to another SMTP-server? (Specify ONLY the option name without any values.)

Revisar porque creo que la opción es relayhost

What option in the sshd configuration file instructs sshd to permit only specific user names to log in to a system? (Specify ONLY the option name without any values.)

¿Se puede comprobar la validez de la configuración de un servidor postfix sin tener que iniciar el servicio?

¿Cómo se puede validar la sintaxis de un archivo de configuración Apache sin tener que iniciar el servicio?

De entre todos los comandos de comprobación de resolución DNS, ¿cuál proporciona los resultados más precisos y detallados?

¿ En que puerto escucha nuestro servidor DNS?

¿Qué archivo contiene una lista de puertos de aplicación estándar?

¿Qué programa OpenLDAP se ejecuta como el servidor LDAP principal, escuchando las solicitudes del cliente LDAP?

¿El comando ldapsearch?

¿En cuál de los siguientes directorios encontrará normalmente los archivos de registro de Samba?

¿ Cual es el archivo por el que resuelve nuestro dns como cliente en linux?

¿Comando para ver la arquitectura de un so de linux?

¿Se puede comprobar la validez de un archivo de configuración Samba sin cargar el servicio?

Where are the Postfix configuration files located?

Where do individual users store procmail recipes to apply to their own email messages?

What files does the email administrator use to store recipes to apply to all incoming email messages?

What does the following procmail recipe do to incoming email messages?

What MDA program is commonly used to forward email messages to local mailboxes?

What configuration setting in Postfix must you change to forward all incoming email messages to procmail?

Which mailbox style stores all messages for a user in a single file?

Which mailbox style uses separate files to store each message for each user?

Where are the Courier configuration files located?

What Courier configuration setting determines how many remote clients can connect at the same time?

Where does Dovecot store its configuration settings? (Select two.)

What is the name of the main Postfix process?

What Dovecot setting specifies the authentication methods that the server supports?

What is the Postfix configuration file that manages when Postfix processes start and stop?

What is the Postfix configuration file that controls mail processing?

What directory does Postfix use for storing email messages as it processes them?

What sendmail emulation command in Postfix allows you to check on the number of mes- sages waiting in the mail queue to be delivered?

Which sendmail emulation command converts the text alias entries into the binary aliases database file?

What text file does the newaliases command read to create the aliases database?

What log file does Postfix use to store system messages?

The .edu domain is considered which domain type? (Choose the best answer.)

A logging category directive determines what? (Choose the best answer.)

Which of the following are legal zone type directives? (Choose all that apply.)

Which of the following are legal zone statement classes? (Choose all that apply.)

Why might authoritative zone information be copied from the primary name server’s zone databases over to the secondary name server (called a zone transfer)? (Choose all that apply.)

The default zone databases are typically stored in which directories? (Choose the two best answers.)

A zone database has resource records of various types. One such record identifies the author- ity zone’s start and includes the zone’s authoritative data. Which one of the following is this resource record type? (Choose the best answer.)

Which of the following best describes a Reverse Zone? (Choose the best answer.)

Which of the following are methods for securing your DNS services? (Choose all that apply.)

When setting up a chroot jail, the new root directory is typically which directory? (Choose two answers.)

In the BIND DNSSEC security extension, the encryption key used to digitally sign a particular zone’s resource records is called what? (Choose the best answer.)

Domain Name Space is broken into different zones. Which of the following could be one of those zones? (Choose all that apply.)

Which utility is used to create either TSIG or DNSSEC keys? (Choose the best answer.)

Which of the following server combinations could be the minimum two name servers required for a zone? (Choose all that apply.)

A program or library routine that creates a DNS query, checks its own cache for the answer, and if it doesn’t find it there, sends the query to another name server, is called what? (Choose the best answer.)

Which of the following software provides either full or partial DNS protocol implementation? (Choose all that apply.)

The BIND daemon is which program in the /usr/sbin/ directory? (Choose the best answer.)

Which of the following are legitimate groupings (clauses) in the BIND’s primary configura- tion file, named.conf? (Choose all that apply.)

When setting up a local DNS caching-only server, which directives should be set and or modified in the named.conf file? (Choose all that apply.)

Ignoring distribution differences and assuming you have the appropriate privileges, which of the following commands will stop the BIND service? (Choose all that apply.)

What protocol defines how a web server responds to client requests?

Esta solución seguro que está mal

What directive should you use to allow system users to create their own web folders?

In name-based virtual hosting, what directive defines the domain name used?

In IP-based virtual hosting, what directive defines the different IP addresses for the server to listen on?

What Apache utility program allows you to create text userid/password files?

What directive points to the userid/password file that controls access?

What dynamic web programming method allows the Apache server to utilize an external program interpreter?

What directive tells the Apache server to redirect .php files to the PHP server process?

What directive tells the Apache server the location of the SSL certificate?

What does a web proxy server do? (Select two.)

What directive does Squid use to define client authentication settings?

What standard defines how a client formats the content contained in a web page?

What section in the nginx configuration file defines the basic server settings?

What HTTP server response code indicates that the file requested by the client was not found?

What utility allows you to stop the Apache web server gracefully?

What utility allows you to test an Apache web server configuration before actually starting the server?

What directive defines the location on the server that will be shared with clients?

What configuration feature allows you to apply directives to specific folders in the filesystem?

What configuration directive defines what information appears in the Apache log file?

Which Apache log file contains information about what web page requests were made by clients?

In which of the following directories would you typically find Samba log files? (Choose the best answer.)

Which of the following items might assist you in troubleshooting a problem with a Samba client accessing a Samba share? (Choose all that apply.)

The NFS service that manages NFS client mount requests on the NFS server is which of the following? (Choose the best answer.)

NFS export configuration files are typically located where? (Choose all that apply.)

Which of the following are typical NFS share directory locations? (Choose all that apply.)

Which of the following /etc/exports directives would be important for trying to create a read-only share’s configuration record? (Choose all that apply.)

Which of the following NFS utilities would show NFS share information specifically? (Choose all that apply.)

When using the exportfs command to display NFS share information on an NFS server, which of the following operands is the most helpful? (Choose the best answer.)

Which of the following is software that you may employ to implement an FTP server? (Choose all that apply.)

Which of the following statements are true about FTP passive mode? (Choose all that apply.)

Which usernames are typically used on the FTP server for handling anonymous connections? (Choose all that apply.)

Which of the following Linux daemons may be used in providing Samba services? (Choose all that apply.)

Which of the following directives are used in various FTP server daemons to allow anonymous uploads? (Choose all that apply.)

To set up a Samba share, you need to modify the main Samba configuration file. Which of the following is this file? (Choose the best answer.)

Once you have modified the main Samba configuration file, what should you do next? (Choose the best answer.)

For setting up Samba in a mixed environment of Windows and Linux systems, it is essential to set the directive to the Windows workgroup or domain name and not an FQDN. (Choose the best answer.)

For the Samba passdb backend directive, which of the following are legal settings? (Choose all that apply.)

Which section in the smb.conf file might you find a file share defined? (Choose the best answer.)

Which of the following Samba directives can be used to set whether passwords are required to access this file share service? (Choose the best answer.)

Assuming appropriate access is granted, the __ command allows FTP-style access to a Samba share. (Choose the best answer.)

What does the DHCPd application use for its configuration file?

Which PAM module provides restrictions on user passwords.

When using a single configuration file for PAM, where is it located?

What folder does PAM use to store multiple application configuration files?

Which PAM control entry terminates the application if the authentication fails?

Which PAM feature type logs authentication attempts to a log file?

What part of the LDAP database defines a template for a set of attributes that can be assigned to an object?

What part of the LDAP database defines the information stored for an object?

What is the unique name assigned to each object in the LDAP database called?

What OpenLDAP program runs as the main LDAP server, listening for LDAP client requests?

What LDAP server program allows you to add new objects to the LDAP database?

What DHCPd option setting do you use to define the default router for network clients?

What LDAP client application allows you to add new objects to the LDAP database?

What DHCPd configuration option setting do you use to define the pool of IP addresses to assign to network clients?

What file do you use to track IP addresses currently assigned by DHCPd?

What DHCPd configuration setting defines the MAC address of a device so that you can assign it a static IP address?

What DHCP configuration feature bundles settings assigned to a specific client?

What DHCP option number defines the subnet mask assigned to a client?

Which PAM module supports using the standard /etc/passwd and /etc/shadow files for authentication?

Which PAM module supports using a network directory to authenticate users?

Which application is a network intrusion detection system (NIDS)?

Which Snort mode dumps packets to the display for viewing?

What does the HOME_NET variable define in the Snort configuration?

What do you call a vulnerability that allows an attacker to gain access to a system?

Which rule address format tells Snort only to look for packets going from the 10.0.0.1 address to the 10.0.0.2 address?

How many private network address ranges does IPv4 support?

What value do IPv6 link local addresses start with?

What system allows you to connect clients on a private network address to outside servers?

What Linux command do you use to create firewall rules on the system?

Which iptables option adds a new rule to a chain?

Which iptables policy is used to send a return packet back to the source indicating that the packet was dropped?

What file contains a list of standard application ports?

Which iptables option defines the default policy for a chain?

How can you use the telnet command to detect an open port?

Which command can display a list of TCP ports that are listening for incoming connections on a local server?

Which option of the netcat command allows it to scan multiple ports?

Which nmap option specifies that it should determine the fingerprint of the remote system?

What OpenVAS feature allows it to simulate different vulnerability attacks on the system it scans?

What type of software can warn you of an active attack on your system?

What file contains the fail2ban rules?