Our pass rate is high to 98.9% and the similarity percentage between our 117-202 study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the LPI 117-202 exam in just one try? I am currently studying for the LPI 117-202 exam. Latest LPI 117-202 Test exam practice questions and answers, Try LPI 117-202 Brain Dumps First.

Q9. A security-conscious administrator would change which TWO of the following lines found in an SSH configuration file?

A. Protocol 2, l

B. PermitEmptyPasswords no

C. Port 22

D. PermitRootlogin yes

E. IgnoreRhosts yes

Answer: A, D 


Q10. The new file server is a member of the Windows domain "foo". Which TWO of the following configuration sections will allow members of the domain group "all" to read, write and execute files in "/srv/smb/data"?

A. [data] comment = data share path = /srv/smb/data write list = @foo+all force group = @foo+all create mask = 0550 directory mask = 0770

B. [data] comment = data share path = /srv/smb/data write list = @foo+all force group = @foo+all create mask = 0770 directory mask = 0770

C. [data] path = /srv/smb/data write list = @foo+all force group = @foo+all create mask = 0770 directory mask = 0770

D. [data] comment = data share path = /srv/smb/data write list = @foo+all force group = @foo+all directory mask = 0770

E. [data] comment = data share path = /srv/smb/data write list = @foo+all force group = all create mask = 0550 directory mask = 0770

Answer: B, C 


Q11. Postfix daemons can be chroot'd by setting the chroot flag in _____. (Supply only the filename, without a path)

Answer: master.cf 


Q12. Which Squid configuration directive defines the authentication method to use?

A. auth_param

B. auth_method

C. auth_program

D. auth_mechanism

E. proxy_auth

Answer: A


Q13. A BIND server should be upgraded to use TSIG. Which configuration parameters should be added, if the server should

use the algorithm hmac-md5 and the key skrKc4DoTzi/tAkllPi7JZA== ?

A. TSIG server.example.com. algorithm hmac-md5;

secret "skrKc4DoTzi/tAkllPi7JZA==";

};

B. key server.example.com. {

algorithm hmac-md5;

secret skrKc4DoTzi/tAkllPi7JZA==;

};

C. key server.example.com. {

algorithm hmac-md5;

secret "skrKc4DoTzi/tAkllPi7JZA==";

};

D. key server.example.com. {

algorithm=hmac-md5;

secret="skrKc4DoTzi/tAkllPi7JZA==";

};

E. key server.example.com. {

algorithm hmac-md5

secret  "skrKc4DoTzi/tAkIlPi7JZA=="

};

Answer: C


Q14. During which stage of the boot process would this message be seen?

Ide0: BM-DMA at 0xff00-0xff07, BIOS settings: hda:DMA, hdb:DMA

A. Boot loader start and hand off to kernel

B. Kernel loading

C. Hardware initialization and setup

D. Daemon initialization and setup

Answer:


Q15. Considering the following excerpt from the httpd.conf file, select the correct answer below:

<location> AllowOverride AuthConfig Indexes

</location>

A. The Indexes directive in the excerpt allows the use of other index-related directives such as DirectoryIndex

B. Both directives AuthConfig and Indexes found in the server's .htaccess file will be overridden by the same directives found in the httpd.conf file

C. The AuthConfig used in the excerpt allows the use of other authentication-related directives such as AuthType

D. The excerpt is incorrect, as the AllowOverride cannot be used with Indexes, since the latter cannot be overridden

E. The excerpt is incorrect, because AllowOverride cannot be used inside a location section

Answer:


Q16. Which of the following lines in the Apache configuration file would allow only clients with a valid certificate to access the website?

A. SSlCA conf/ca.crt

B. AuthType ssl

C. IfModule libexec/ssl.c

D. SSlRequire

E. SSlVerifyClient require

Answer: