Which of the following recipes will append emails from "root" to the "rootmails" mailbox?
A. :0c: rootmails
* ^From.*root
B. :0c:
* ^From.*root
rootmails
C. :0c:
* ^From=root
rootmails
D. :0c:
* ^From=*root
rootmails
E. :0c: $From=$root rootmails
Which of the following options can be passed to a DHCP client machine using configuration options on the DHCP server?
A. The NIS domain name
B. The resolving order in /etc/resolv.conf
C. The priority order in nsswitch.conf
D. The filter rules for iptables
E. The contents of hosts.allow and hosts.deny
What is the purpose of a PTR record?
A. To provide name to IP resolution.
B. To provide IP to name resolution.
C. To direct email to a specific host.
D. To provide additional host information.
E. To direct clients to another nameserver.
Which files are read by the lsdev command? (Please specify THREE answers)
A. /proc/dma
B. /proc/filesystems
C. /proc/interrupts
D. /proc/ioports
E. /proc/swaps
Which is a valid Squid option to define a listening port?
A. port = 3128
B. http-listen-port=3128
C. http_port 3128
D. squid_port 3128
Which environment variables are used by ssh-agent? (Please select TWO variables)
A. SSH_AGENT_KEY
B. SSH_AGENT_SOCK
C. SSH_AGENT_PID
D. SSH_AUTH_SOCK
E. SSH_AUTH_PID
Why is the root file system mounted read-only during boot and remounted with write permission later on?
A. Because if problems with the root file system are detected during the boot, fsck can be run, without risk of damage.
B. Because this way crackers cannot collect information about root with boot sniffers
C. To avoid writing to the disk, unless the root password is known.
D. To avoid other operating systems overwriting the Linux root partition
E. Because the disk has its own write protection that cannot change by the operating system.
What command is used to print NFS kernel statistics? (Provide the command with or without complete path)
A. nfsstat
What is the name of the module in Apache that provides the HTTP Basic Authentication functionality? (Please provide ONLY the module name)
A. mod_auth
A security-conscious administrator would change which TWO of the following lines found in an SSH configuration file?
A. Protocol 2, 1
B. PermitEmptyPasswords no
C. Port 22
D. PermitRootLogin yes
E. IgnoreRhosts yes
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Lpi exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 202-450 exam preparations and Lpi certification application, do not hesitate to visit our Vcedump.com to find your solutions here.