On a Linux router, packet forwarding for IPv4 has been enabled. After a reboot, the machine no longer forwards IP packets from other hosts. The commanD.
echo 1 > /proc/sys/net/ipv4/ip_forward temporarily resolves this issue. Which one of the following options is the best way to ensure this setting is saved across system restarts?
A. Add echo 1 > /proc/sys/net/ipv4/ip_forward to the root user login script.
B. Add echo 1 > /proc/sys/net/ipv4/ip_forward to any user login script.
C. In /etc/sysctl.conf change net.ipv4.ip_forward to 1.
D. In /etc/rc.local add net.ipv4.ip_forward = 1.
E. In /etc/sysconfig/iptables-config add ipv4.ip_foward = 1.
With Nginx, which of the following directives is used to proxy requests to a FastCGI application?
A. fastcgi_pass
B. fastcgi_proxy
C. proxy_fastcgi
D. proxy_fastcgi_pass
Which setting in the Courier IMAP configuration file will tell the IMAP daemon to listen only on the localhost interface?
A. ADDRESS=127.0.0.1
B. Listen 127.0.0.1
C. INTERFACE=127.0.0.1
D. LOCALHOST_ONLY=1
Which of the following are commonly used log file directives in Apache? (Choose TWO correct answers.)
A. ConfigLog
B. CustomLog
C. ErrorLog
D. ServerLog E. VHostLog
Which of the following commands can be used to connect and interact with remote services? (Choose TWO correct answers.)
A. nettalk
B. nc
C. telnet
D. cat
E. netmap
Which of the following Samba configuration parameters is functionally identical to the parameter read only=yes?
A. browseable=no
B. read write=no
C. writeable=no
D. write only=no
E. write access=no
In which Apache context should SSL support be activated?
A. In a VirtualHost directive
B. In a Location directive
C. In a Directory directive which is set to /
D. In a SSLHost directive
Which of the following are Samba security modes or levels? (Choose TWO correct answers.)
A. ads
B. data
C. ldap
D. network
E. share
In a PAM configuration file, which of the following is true about the sufficient control flag in the following line?
Auth sufficient pam_module.so
A. This PAM module is called if it is present, otherwise, further modules will be tried.
B. This module is sufficient to determine both success or failure of an authentication attempt and no other modules will need to be tried.
C. Failure of this module will not be considered fatal and, if the module succeeds, success will be returned to the application immediately without considering and further modules.
D. If a previous required module fails, success of this module will be used to check if further modules in the stack should be tried.
Which of the following daemons will monitor log files for inappropriate activity, such as login attempts, from remote IP addresses and will add netfilter rules to block the offending address?
A. fail2ban
B. portsentry
C. openids
D. logwatch
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Lpi exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 202-450 exam preparations and Lpi certification application, do not hesitate to visit our Vcedump.com to find your solutions here.