Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Mock Test Free

202-450 Mock Test Free

Table of Contents

Toggle
  • 202-450 Mock Test Free – 50 Realistic Questions to Prepare with Confidence.
  • Access Full 202-450 Mock Test Free

202-450 Mock Test Free – 50 Realistic Questions to Prepare with Confidence.

Getting ready for your 202-450 certification exam? Start your preparation the smart way with our 202-450 Mock Test Free – a carefully crafted set of 50 realistic, exam-style questions to help you practice effectively and boost your confidence.

Using a mock test free for 202-450 exam is one of the best ways to:

  • Familiarize yourself with the actual exam format and question style
  • Identify areas where you need more review
  • Strengthen your time management and test-taking strategy

Below, you will find 50 free questions from our 202-450 Mock Test Free resource. These questions are structured to reflect the real exam’s difficulty and content areas, helping you assess your readiness accurately.

Question 1

Which of the following actions are available in Sieve core lters? (Choose three.)

A. drop

B. discard

C. leinto

D. relay

E. reject

 


Correct Answer: BCE

Question 2

Which keyword is used in the Squid configuration to define networks and times used to limit access to the service?

A. acl

B. allow

C. http_allow

D. permit
eference: https://www.tecmint.com/configure-squid-server-in-linux/
Reference: https://www.tecmint.com/configure-squid-server-in-linux/

 


Correct Answer: R

Question 3

For what purpose is TCP/IP stack ngerprinting used by nmap?

A. It is used to determine the remote operating system.

B. It is used to filter out responses from specific servers.

C. It is used to identify duplicate responses from the same remote server.

D. It is used to masquerade the responses of remote servers.

E. It is used to uniquely identify servers on the network for forensics.
eference: https://nmap.org/nmap- ngerprinting-old.html
Reference: https://nmap.org/nmap- ngerprinting-old.html

 


Correct Answer: R

Question 4

FILL BLANK -
Which action in a Sieve filter forwards a message to another email address without changing the message? (Specify ONLY the action's name without any parameters.)

Correct Answer: redirect

 

Question 5

Which of the following options are valid in /etc/exports? (Choose two.)

A. rw

B. ro

C. rootsquash

D. norootsquash

E. uid

 


Correct Answer: AB

Question 6

Which Apache HTTPD configuration directive is used to specify the method of authentication, e.g. None or Basic?

A. AuthUser

B. AllowedAuthUser

C. AuthType

D. AllowAuth
eference: https://httpd.apache.org/docs/2.4/howto/auth.html
Reference: https://httpd.apache.org/docs/2.4/howto/auth.html

 


Correct Answer: R

Question 7

FILL BLANK -
What command creates a SSH key pair? (Specify ONLY the command without any path or parameters)

Correct Answer: ssh-keygen

 

Question 8

What is the name of the network security scanner project which, at the core, is a server with a set of network vulnerability tests?

A. NetMap

B. OpenVAS

C. Smartscan

D. Wireshark

 


Correct Answer: B

Question 9

To allow X connections to be forwarded from or through an SSH server, what configuration keyword must be set to yes in the sshd configuration file?

A. AllowForwarding

B. ForwardingAllow

C. XllForwardingAllow

D. XllForwarding
eference: https://help.ubuntu.com/community/SSH/OpenSSH/configuring
Reference: https://help.ubuntu.com/community/SSH/OpenSSH/configuring

 


Correct Answer: R

Question 10

How are PAM modules organized and stored?

A. As plain text files in /etc/security/

B. A statically linked binaries in /etc/pam.d/bin/

C. As Linux kernel modules within the respective sub directory of /lib/modules/

D. As shared object files within the /lib/ directory hierarchy

E. As dynamically linked binaries in /usr/lib/pam/sbin/

 


Correct Answer: D

Question 11

Topic 2
Fill in the blank.
What command creates a SSH key pair? (Specify ONLY the command without any path or parameters)
ssh-keygen

Correct Answer:

 

Question 12

FILL BLANK -
In order to export /usr and /bin via NFSv4, /exports was created and contains working bind mounts to /usr and /bin. The following lines are added to /etc/exports on the NFC server:


After running –
mount -t nfsv4 server:/ /mnt
of an NFC-Client, it is observed that /mnt contains the content of the server’s /usr directory instead of the content of the NFSv4 foot folder. Which option in /etc/exports has to be changed or removed in order to make the NFSv4 root folder appear when mounting the highest level of the server?
(Specify ONLY the option name without any values or parameters.)

Correct Answer: mount

 

Question 13

On a Linux router, packet forwarding for IPv4 has been enabled. After a reboot, the machine no longer forwards IP packets from other hosts. The command: echo 1 > /proc/sys/net/ipv4/ip_forward temporarily resolves this issue. Which one of the following options is the best way to ensure this setting is saved across system restarts?

A. Add echo 1 > /proc/sys/net/ipv4/ip_forward to the root user login script

B. Add echo 1 > /proc/sys/net/ipv4/ip_forward to any user login script

C. In /etc/sysct1.conf change net.ipv4.ip_forward to 1

D. In /etc/rc.local add net.ipv4.ip_forward = 1

E. In /etc/sysconfig/iptables-config add ipv4.ip_forward = 1

 


Correct Answer: C

Question 14

What is the purpose of DANE?

A. Verify the integrity of name information retrieved via DNS.

B. Allow secure dynamic DNS updates.

C. Invalidate name information stored on caching name servers to speed up DNS updates.

D. Discover which servers within a DNS domain offer a specific service.

E. Provide a way to verify the association of X 509 certificates to DNS host names.
eference: https://wiki.archlinux.org/index.php/DANE
Reference: https://wiki.archlinux.org/index.php/DANE

 


Correct Answer: R

Question 15

What option for BIND is required in the global options to disable recursive queries on the DNS server by default?

A. allow-recursive-query ( none; );

B. allow-recursive-query off;

C. recursion { disabled; };

D. recursion { none; };

E. recursion no;

 


Correct Answer: E

Question 16

Which of the following statements in the ISC DHCPD configuration is used to specify whether or not an address pool can be used by nodes which have a corresponding host section in the configuration?

A. identified-nodes

B. unconfigured-hosts

C. missing-peers

D. unmatched-hwaddr

E. unknown-clients

 


Correct Answer: E

Question 17

Which Post x command can be used to rebuild all of the alias database files with a single invocation and without the need for any command line arguments?

A. makealiases

B. newaliases

C. postalias

D. postmapbuild

 


Correct Answer: B

Question 18

What is the name of the Dovecot configuration variable that speci es the location of user mail?

A. mbox

B. mail_location

C. user_dir

D. maildir

E. user_mail_dir

 


Correct Answer: B

Question 19

What option in the client configuration file would tell OpenVPN to use a dynamic source port when making a connection to a peer?

A. src-port

B. remote

C. source-port

D. nobind

E. dynamic-bind

 


Correct Answer: D

Question 20

To which destination will a route appear in the Linux routing table after activating IPv6 on a router's network interface, even when no global IPv6 addresses have been assigned to the interface?

A. fe80::/10

B. 0::/128

C. 0::/0

D. fe80::/64

E. 2000::/3

 


Correct Answer: D

Question 21

Which of these tools provides DNS information in the following format?


A. dig

B. nslookup

C. host

D. named-checkconf

E. named-checkzone

 


Correct Answer: C

Question 22

Which of the following statements are true regarding Server Name Indication (SNI)? (Choose two.)

A. It supports transparent failover of TLS sessions from one web server to another.

B. It allows multiple SSL/TLS secured virtual HTTP hosts to coexist on the same IP address.

C. It enables HTTP servers to update the DNS of their virtual hosts’ names using the X 509 certificates of the virtual hosts.

D. It provides a list of available virtual hosts to the client during the TLS handshake.

E. It submits the host name of the requested URL during the TLS handshake.

 


Correct Answer: BE

Question 23

What is the standard port used by OpenVPN?

A. 1723

B. 4500

C. 500

D. 1194

 


Correct Answer: D

Question 24

Which of the following sshd configuration should be set to no in order to fully disable password based logins? (Choose two.)

A. PAMAuthentication

B. ChallengegeResponseAuthentication

C. PermitPlaintextLogin

D. UsePasswords

E. PasswordAuthentication

 


Correct Answer: BE

Question 25

Which of the following commands displays an overview of the Post x queue content to help identify remote sites that are causing excessive mail traffic?

A. mailtraf

B. queuequery

C. qshape

D. postmap

E. poststats

 


Correct Answer: C

Question 26

Which option in named.conf speci es which host are permitted to ask for domain name information from the server?

A. allowed-hosts

B. accept-query

C. permit-query

D. allow-query

E. query-group

 


Correct Answer: D

Question 27

Select the Samba option below that should be used if the main intention is to setup a guest printer service?

A. security = cups

B. security = ldap

C. security = pam

D. security = share

E. security = printing

 


Correct Answer: D

Question 28

FILL BLANK -
Which directive in a Nginx server configuration block defines the TCP ports on which the virtual host will be available, and which protocols it will use? (Specify
ONLY the option name without any values.)
listen

Correct Answer:

 

Question 29

With Nginx, which of the following directives is used to proxy requests to a FastCGI application?

A. fastcgi_pass

B. fastcgi_proxy

C. proxy_fastcgi

D. proxy_fastcgi_pass

E. fastcgi_forward

 


Correct Answer: A

Question 30

The content of which local file has to be transmitted to a remote SSH server in order to be able to log into the remote server using SSH keys?

A. ~/.ssh/authorized_keys

B. ~/.ssh/config

C. ~/.ssh/id_rsa.pub

D. ~/.ssh/id_rsa

E. ~./ssh/known_hosts
eference: https://www.digitalocean.com/community/tutorials/ssh-essentials-working-with-ssh-servers-clients-and-keys Community vote distribution
Reference: https://www.digitalocean.com/community/tutorials/ssh-essentials-working-with-ssh-servers-clients-and-keys Community vote distribution

 


Correct Answer: R

Question 31

Which of the following is correct about this excerpt from an LDIF file?

A. dn is the domain name.

B. o is the operator name.

C. cn is the common name.

D. dn is the relative distinguished name.

E. DC is the delegation container.

 


Correct Answer: C

Question 32

Using its standard configuration, how does fail2ban block offending SSH clients?

A. By rejecting connections due to its role as a proxy in front of SSH

B. By modifying and adjusting the SSHD configuration.

C. By creating and maintaining net filter rules.

D. By creating null routes that drop any answer packets sent to the client.

E. By modifying and adjusting the TCP Wrapper configuration for SSH

F. eference: https://www.digitalocean.com/community/tutorials/how-to-protect-ssh-with-fail2ban-on-centos-7 Community vote distribution
Reference: https://www.digitalocean.com/community/tutorials/how-to-protect-ssh-with-fail2ban-on-centos-7 Community vote distribution

 


Correct Answer: R

Question 33

Which of the following statements is INCORRECT regarding the LDIF file format?

A. It contains a dn line that indicates where the attributes listed in the following lines of the file must be added.

B. In the file, a blank line separates one entry from another one.

C. If an attribute contains binary data, some specific configurations must be made for this entry.

D. The LDIF file accepts any type of file encoding.

 


Correct Answer: D

Question 34

Performing a DNS lookup with dig results in this answer:

A. There is no . after linuserv.example.net in the PTR record in the forward lookup zone file

B. There is no . after linuserv in the PTR record in the forward lookup zone file

C. There is no . after linuserv.example.net in the PTR record in the reverse lookup zone file

D. The . in the NS definition in the reverse lookup zone has to be removed

 


Correct Answer: C

Question 35

In order to join a file server to the Active Directory domain intra.example.com, the following smb.conf has been created:


The command net ads join raises an error and the server is not joined to the domain. What should be done to successfully join the domain?

A. Change server role to ad member server to join an Active Directory domain instead of an NT4 domain.

B. Add realm = intra.example.com to the smb.conf and change workgroup to the domain’s netbios workgroup name.

C. Manually create a machine account in the Active Directory domain and specify the machine account’s name with “”U when starting net ads join.

D. Remove the winbind enum users and winbind enum groups since winbind is incompatible with Active Directory domains.

E. Remove all idmap configuration stanzas since the id mapping is defined globally in an Active Directory domain and cannot be changed on a member server.

 


Correct Answer: B

Question 36

Which configuration parameter on a Post x server modifies only the sender address and not the recipient address?

A. alias_maps

B. alias_rewrite_maps

C. sender_canonical_maps

D. sender_rewrite_maps

 


Correct Answer: C

Question 37

In which CIFS share must printer drivers be placed to allow Point'n'Print driver deployment on Windows?

A. winx64drv$

B. print$

C. The name of the share is speci ed in the option print driver share within each printable share in smb.conf

D. pnpdrivers$

E. NETLOGON

 


Correct Answer: B

Question 38

Which of the following services belongs to NFSv4 and does not exist in NFSv3?

A. rpc.idmapd

B. rpc.statd

C. nfsd

D. rpc.mountd
eference: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/5/html/deployment_guide/ch-nfs
Reference: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/5/html/deployment_guide/ch-nfs

 


Correct Answer: R

Question 39

When the default policy for the net filter INPUT chain is set to DROP, why should a rule allowing traffic to localhost exist?

A. All traffic to localhost must always be allowed

B. It doesn’t matter; net filter never affects packets addressed to localhost

C. Some applications use the localhost interface to communicate with other applications

D. syslogd receives messages on localhost

E. The iptables command communicates with the net filter management daemon net lterd on localhost to create and change packet filter rules

 


Correct Answer: C

Question 40

Which of the following PAM modules allows the system administrator to use an arbitrary file containing a list of user and group names with restrictions on the system resources available to them?

A. pam_ filter

B. pam_limits

C. pam_list file

D. pam_unix

 


Correct Answer: B

Question 41

FILL BLANK -
According to the configuration below, what is the full e-mail address of the administrator for this domain?

Correct Answer: admin@mars.example.com

 

Question 42

FILL BLANK -
Which attitude of an object in LDAP defines which other attributes can be set for the object? (Specify ONLY the attribute name without any values.)

Correct Answer: class

 

Question 43

Which of the following information has to be submitted to a certi cation authority in order to request a web server certificate?

A. The web server’s private key.

B. The IP address of the web server.

C. The list of ciphers supported by the web server.

D. The web server’s SSL configuration file.

E. The certificate signing request.

 


Correct Answer: E

Question 44

Which of the following types of IPv6 address assignments does DHCPv6 support? (Choose three.)

A. Assignments of normal IPv6 addresses that can be renewed.

B. Assignments of temporary IPv6 addresses that cannot be renewed.

C. Assignments of blacklisted IPv6 addresses that should no longer be used.

D. Assignments of IPv6 pre xes that can be used for routing or further assignments.

E. Assignments of anonymous IPv6 addresses whose assignment is not logged by the DHCPv6 server.

 


Correct Answer: ABD

Question 45

Which command is used to administer IPv6 net filter rules?

A. iptables

B. iptablesv6

C. iptables6

D. ip6tables

E. ipv6tables
eference: https://www.centos.org/docs/5/html/5.1/Deployment_Guide/s1-ip6tables.html Community vote distribution
Reference: https://www.centos.org/docs/5/html/5.1/Deployment_Guide/s1-ip6tables.html Community vote distribution

 


Correct Answer: R

Question 46

FILL BLANK -
What command displays NFC kernel statistics? (Specify ONLY the command without any path or parameters.)
nfsstat

Correct Answer:

 

Question 47

FILL BLANK -
What is the name of the root element of the LDAP tree holding the configuration of an OpenLDAP server that is using directory based configuration? (Specify
ONLY the element's name without any additional information.)

Correct Answer: slapd

 

Question 48

The program vsftpd, running in a chroot jail, gives the following error:


Which of the following actions would fix the error?

A. The file /etc/ld.so.conf in the root filesystem must contain the path to the appropriate lib directory in the chroot jail

B. Create a symbolic link that points to the required library outside the chroot jail

C. Copy the required library to the appropriate lib directory in the chroot jail

D. Run the program using the command chroot and the option–static_libs

 


Correct Answer: C

Question 49

Which of the following lines is valid in a configuration file in /etc/pam.d/?

A. auth required pam_unix.so try_ rst_pass nullok

B. auth try_ rst_pass nullok, require pam_unix.so

C. auth required:pam_unix.so(try_ rst_pass nullok)

D. auth pam_unix.so(required try_ rst_pass nullok)

 


Correct Answer: A

Question 50

Which of these tools, without any options, provides the most information when performing DNS queries?

A. dig

B. nslookup

C. host

D. named-checkconf

E. named-checkzone

 


Correct Answer: A

Access Full 202-450 Mock Test Free

Want a full-length mock test experience? Click here to unlock the complete 202-450 Mock Test Free set and get access to hundreds of additional practice questions covering all key topics.

We regularly update our question sets to stay aligned with the latest exam objectives—so check back often for fresh content!

Start practicing with our 202-450 mock test free today—and take a major step toward exam success!

Share18Tweet11
Previous Post

201-450 Mock Test Free

Next Post

212-89 Mock Test Free

Next Post

212-89 Mock Test Free

220-1001 Mock Test Free

220-1002 Mock Test Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.