informatica:certificaciones:lpic:lpic-2:202_tests_examen
Diferencias
Muestra las diferencias entre dos versiones de la página.
| Ambos lados, revisión anteriorRevisión previa | |||
| informatica:certificaciones:lpic:lpic-2:202_tests_examen [2021/06/27 23:45] – tempwin | informatica:certificaciones:lpic:lpic-2:202_tests_examen [2021/06/28 00:10] (actual) – tempwin | ||
|---|---|---|---|
| Línea 2964: | Línea 2964: | ||
| * '' | * '' | ||
| * '' | * '' | ||
| + | |||
| + | **What does the DHCPd application use for its configuration file?** | ||
| + | |||
| + | * ''/ | ||
| + | * ''/ | ||
| + | * '' | ||
| + | * ''/ | ||
| + | |||
| + | **Which PAM module provides restrictions on user passwords.** | ||
| + | |||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | |||
| + | **When using a single configuration file for PAM, where is it located?** | ||
| + | |||
| + | * ''/ | ||
| + | * ''/ | ||
| + | * ''/ | ||
| + | * ''/ | ||
| + | |||
| + | **What folder does PAM use to store multiple application configuration files?** | ||
| + | |||
| + | * ''/ | ||
| + | * ''/ | ||
| + | * ''/ | ||
| + | * ''/ | ||
| + | |||
| + | **Which PAM control entry terminates the application if the authentication fails?** | ||
| + | |||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | |||
| + | **Which PAM feature type logs authentication attempts to a log file?** | ||
| + | |||
| + | * password | ||
| + | * account | ||
| + | * session (**Solución**) | ||
| + | * auth | ||
| + | |||
| + | **What part of the LDAP database defines a template for a set of attributes that can be assigned to an object?** | ||
| + | |||
| + | * The schema | ||
| + | * The object class (**Solución**) | ||
| + | * The LDAP tree | ||
| + | * The object ID | ||
| + | |||
| + | **What part of the LDAP database defines the information stored for an object?** | ||
| + | |||
| + | * Schema | ||
| + | * Attributes (**Solución**) | ||
| + | * Object class | ||
| + | * Object ID | ||
| + | |||
| + | **What is the unique name assigned to each object in the LDAP database called?** | ||
| + | |||
| + | * Attribute | ||
| + | * Distinguished name (**Solución**) | ||
| + | * Object ID | ||
| + | * Object class | ||
| + | |||
| + | **What OpenLDAP program runs as the main LDAP server, listening for LDAP client requests?** | ||
| + | |||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | |||
| + | **What LDAP server program allows you to add new objects to the LDAP database?** | ||
| + | |||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | |||
| + | **What DHCPd option setting do you use to define the default router for network clients?** | ||
| + | |||
| + | * broadcast-address | ||
| + | * smtp-server | ||
| + | * range | ||
| + | * router | ||
| + | |||
| + | **What LDAP client application allows you to add new objects to the LDAP database?** | ||
| + | |||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | |||
| + | **What DHCPd configuration option setting do you use to define the pool of IP addresses to assign to network clients?** | ||
| + | |||
| + | * broadcast-address | ||
| + | * range (**Solución**) | ||
| + | * smtp-server | ||
| + | * router | ||
| + | |||
| + | **What file do you use to track IP addresses currently assigned by DHCPd?** | ||
| + | |||
| + | * ''/ | ||
| + | * ''/ | ||
| + | * ''/ | ||
| + | * ''/ | ||
| + | |||
| + | **What DHCPd configuration setting defines the MAC address of a device so that you can assign it a static IP address?** | ||
| + | |||
| + | * range | ||
| + | * host-name | ||
| + | * fixed-address | ||
| + | * hardware (**Solución**) | ||
| + | |||
| + | **What DHCP configuration feature bundles settings assigned to a specific client?** | ||
| + | |||
| + | * fixed-address | ||
| + | * host (**Solución**) | ||
| + | * range | ||
| + | * group | ||
| + | |||
| + | **What DHCP option number defines the subnet mask assigned to a client?** | ||
| + | |||
| + | * 6 | ||
| + | * 3 | ||
| + | * 1 (**Solución**) | ||
| + | * 5 | ||
| + | |||
| + | **Which PAM module supports using the standard /etc/passwd and /etc/shadow files for authentication? | ||
| + | |||
| + | * pam_ldap.so | ||
| + | * pam_userdb.so | ||
| + | * pam_sss.so | ||
| + | * pam_unix.so | ||
| + | |||
| + | **Which PAM module supports using a network directory to authenticate users?** | ||
| + | |||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | |||
| + | **Which application is a network intrusion detection system (NIDS)?** | ||
| + | |||
| + | * Snort (**Solución**) | ||
| + | * OpenVPN | ||
| + | * OpenVAS | ||
| + | * OpenSSH | ||
| + | |||
| + | **Which Snort mode dumps packets to the display for viewing?** | ||
| + | |||
| + | * Sniffer mode (**Solución**) | ||
| + | * NIDS mode | ||
| + | * Command-line mode | ||
| + | * Logging mode | ||
| + | |||
| + | **What does the HOME_NET variable define in the Snort configuration? | ||
| + | |||
| + | * The local addresses to monitor (**Solución**) | ||
| + | * The remote addresses to monitor | ||
| + | * The address of the local host | ||
| + | * The default configuration folder | ||
| + | |||
| + | **What do you call a vulnerability that allows an attacker to gain access to a system?** | ||
| + | |||
| + | * Open port | ||
| + | * Open application | ||
| + | * Unsecure communication | ||
| + | * Attack vector (**Solución**) | ||
| + | |||
| + | **Which rule address format tells Snort only to look for packets going from the 10.0.0.1 address to the 10.0.0.2 address?** | ||
| + | |||
| + | * 10.0.0.1 %%->%% 10.0.0.2 (**Solución**) | ||
| + | * 10.0.0.2 %%->%% 10.0.0.1 | ||
| + | * 10.0.0.1 %%<> | ||
| + | * 10.0.0.1 %%<-%% 10.0.0.2 | ||
| + | |||
| + | **How many private network address ranges does IPv4 support?** | ||
| + | |||
| + | * Four | ||
| + | * Two | ||
| + | * None | ||
| + | * Three (**Solución**) | ||
| + | |||
| + | **What value do IPv6 link local addresses start with?** | ||
| + | |||
| + | * fe80 (**Solución**) | ||
| + | * ff02 | ||
| + | * ff05 | ||
| + | * aabb | ||
| + | |||
| + | **What system allows you to connect clients on a private network address to outside servers?** | ||
| + | |||
| + | * SSH | ||
| + | * Telnet | ||
| + | * IDS | ||
| + | * NAT (**Solución**) | ||
| + | |||
| + | **What Linux command do you use to create firewall rules on the system?** | ||
| + | |||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | |||
| + | **Which iptables option adds a new rule to a chain?** | ||
| + | |||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | |||
| + | **Which iptables policy is used to send a return packet back to the source indicating that the packet was dropped?** | ||
| + | |||
| + | * ACCEPT | ||
| + | * LOG | ||
| + | * REJECT (**Solución**) | ||
| + | * DROP | ||
| + | |||
| + | **What file contains a list of standard application ports?** | ||
| + | |||
| + | * ''/ | ||
| + | * ''/ | ||
| + | * ''/ | ||
| + | * ''/ | ||
| + | |||
| + | **Which iptables option defines the default policy for a chain?** | ||
| + | |||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | |||
| + | **How can you use the telnet command to detect an open port?** | ||
| + | |||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * The telnet command only connects to port 23. | ||
| + | |||
| + | **Which command can display a list of TCP ports that are listening for incoming connections on a local server?** | ||
| + | |||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | |||
| + | **Which option of the netcat command allows it to scan multiple ports?** | ||
| + | |||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | |||
| + | **Which nmap option specifies that it should determine the fingerprint of the remote system?** | ||
| + | |||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | |||
| + | **What OpenVAS feature allows it to simulate different vulnerability attacks on the system it scans?** | ||
| + | |||
| + | * Software Repository | ||
| + | * Network Vulnerability Tests (NVT) (**Solución**) | ||
| + | * Web interface | ||
| + | * National Vulnerability Database (NVD) | ||
| + | |||
| + | **What type of software can warn you of an active attack on your system?** | ||
| + | |||
| + | * Port scanner | ||
| + | * Virtual private network (VPN) | ||
| + | * Network Vulnerability Test (NVT) | ||
| + | * Intrusion detection system (IDS) (**Solución**) | ||
| + | |||
| + | **What file contains the fail2ban rules?** | ||
| + | |||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | |||
| + | |||
| + | |||
informatica/certificaciones/lpic/lpic-2/202_tests_examen.1624830357.txt.gz · Última modificación: por tempwin
