Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Practice Exam Free

202-450 Practice Exam Free

Table of Contents

Toggle
  • 202-450 Practice Exam Free – 50 Questions to Simulate the Real Exam
  • Free Access Full 202-450 Practice Exam Free

202-450 Practice Exam Free – 50 Questions to Simulate the Real Exam

Are you getting ready for the 202-450 certification? Take your preparation to the next level with our 202-450 Practice Exam Free – a carefully designed set of 50 realistic exam-style questions to help you evaluate your knowledge and boost your confidence.

Using a 202-450 practice exam free is one of the best ways to:

  • Experience the format and difficulty of the real exam
  • Identify your strengths and focus on weak areas
  • Improve your test-taking speed and accuracy

Below, you will find 50 realistic 202-450 practice exam free questions covering key exam topics. Each question reflects the structure and challenge of the actual exam.

Question 1

What is the standard port used by OpenVPN?

A. 1723

B. 4500

C. 500

D. 1194

 


Correct Answer: D

Question 2

Which global option in squid.conf sets the port number or numbers that Squid will use to listen for client requests?

A. port

B. client_port

C. http_port

D. server_port

E. squid_port

 


Correct Answer: C

Question 3

There is a restricted area in a site hosted by Apache HTTPD, which requires users to authenticate against the file /srv/www/security/sitepasswd. Which command is used to CHANGE the password of existing users, without losing data, when Basic authentication is being used?

A. htpasswd “”c /srv/www/security/sitepasswd user

B. htpasswd /srv/www/security/sitepasswd user

C. htpasswd “”n /srv/www/security/sitepasswd user

D. htpasswd “”D /srv/www/security/sitepasswd user

 


Correct Answer: B

Question 4

It has been discovered that the company mail server is configured as an open relay. Which of the following actions would help prevent the mail server from being used as an open relay while maintaining the possibility to receive company mails? (Choose two.)

A. Restrict Post x to only accept e-mail for domains hosted on this server

B. configure Dovecot to support IMAP connectivity

C. configure net filter to not permit port 25 traffic on the public network

D. Restrict Post x to only relay outbound SMTP from the internal network

E. Upgrade the mailbox format from mbox to maildir

 


Correct Answer: AD

Question 5

Which of the following values can be used in the OpenLDAP attribute olcBackend for any object of the class olcBackendconfig to specify a backend?
(Choose three.)

A. xml

B. bdb

C. passwd

D. ldap

E. text

Topic 2 – More Questions.

 


Correct Answer: BCD

Question 6

Which keyword is used in the Squid configuration to define networks and times used to limit access to the service?

A. acl

B. allow

C. http_allow

D. permit
eference: https://www.tecmint.com/configure-squid-server-in-linux/
Reference: https://www.tecmint.com/configure-squid-server-in-linux/

 


Correct Answer: R

Question 7

A zone file contains the following lines:


and is included in the BIND configuration using this configuration stanza:


Which problem is contained in this configuration?

A. The zone statement is the BIND configuration must contain the cross-zone-data yes; statement.

B. The zone cannon contain records for a name which is outside the zone’s hierarchy.

C. The $ORIGIN declaration cannot be used in zone files that are included for a specific zone name in the BIND configuration.

D. An A record cannot contain an IPv4 address because its value is supposed to be a reverse DNS name.

E. Names of records in a zone file cannot be fully quali ed domain names.

 


Correct Answer: B

Question 8

Which of the following PAM modules allows the system administrator to use an arbitrary file containing a list of user and group names with restrictions on the system resources available to them?

A. pam_ filter

B. pam_limits

C. pam_list file

D. pam_unix

 


Correct Answer: B

Question 9

FILL BLANK -
According to this LDIF excerpt, which organizational unit is Robert Smith part of? (Specify only the organizational unit.)

Correct Answer: people

 

Question 10

Which http_access directive for Squid allows users in the ACL named sales_net to only access the Internet at times speci ed in the time_acl named sales_time?

A. http_access deny sales_time sales_net

B. http_access allow sales_net sales_time

C. http_access allow sales_net and sales-time

D. allow http_access sales_net sales_time

E. http_access sales_net sales_time

 


Correct Answer: B

Question 11

Which of the following services belongs to NFSv4 and does not exist in NFSv3?

A. rpc.idmapd

B. rpc.statd

C. nfsd

D. rpc.mountd
eference: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/5/html/deployment_guide/ch-nfs
Reference: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/5/html/deployment_guide/ch-nfs

 


Correct Answer: R

Question 12

Which Post x command can be used to rebuild all of the alias database files with a single invocation and without the need for any command line arguments?

A. makealiases

B. newaliases

C. postalias

D. postmapbuild

 


Correct Answer: B

Question 13

How are PAM modules organized and stored?

A. As plain text files in /etc/security/

B. A statically linked binaries in /etc/pam.d/bin/

C. As Linux kernel modules within the respective sub directory of /lib/modules/

D. As shared object files within the /lib/ directory hierarchy

E. As dynamically linked binaries in /usr/lib/pam/sbin/

 


Correct Answer: D

Question 14

Which of these sets of entries does the following command return?

A. Entries that don’t have a cn of marie or don’t have a telephoneNumber that begins with 9.

B. Entries that have a cn of marie or don’t have a telephoneNumber beginning with 9.

C. Entries that have a cn of marie and a telephoneNumber that ending with 9.

D. Entries that don’t have a cn of marie and don’t have a telephoneNumber beginning with 9.

E. Entries that have a cn of marie or have a telephoneNumber beginning with 9.

 


Correct Answer: B

Question 15

When the default policy for the net filter INPUT chain is set to DROP, why should a rule allowing traffic to localhost exist?

A. All traffic to localhost must always be allowed

B. It doesn’t matter; net filter never affects packets addressed to localhost

C. Some applications use the localhost interface to communicate with other applications

D. syslogd receives messages on localhost

E. The iptables command communicates with the net filter management daemon net lterd on localhost to create and change packet filter rules

 


Correct Answer: C

Question 16

Which option within a Nginx server configuration section defines the file system path from which the content of the server is retrieved?

A. location

B. htdocs

C. DocumentRoot

D. root

E. base_dir

 


Correct Answer: D

Question 17

Which Apache HTTPD directive enables HTTPS protocol support?

A. HTTPSEngine on

B. SSLEngine on

C. SSLEnable on

D. HTTPSEnable on

E. StartTLS on

 


Correct Answer: B

Question 18

FILL BLANK -
Which OpenLDAP client command can be used to change the password for an LDAP entry? (Specify ONLY the command without any path or parameters.)

Correct Answer: ldappasswd

 

Question 19

In the main Post x configuration file, how are service definitions continued on the next line?

A. It isn’t possible. The service definition must t on one line.

B. The initial line must end with a backslash character ().

C. The following line must begin with a plus character (+).

D. The following line must begin with white space indentation.

E. The service definition continues on the following lines until all of the required elds are speci ed.

 


Correct Answer: D

Question 20

FILL BLANK -
What command displays NFC kernel statistics? (Specify ONLY the command without any path or parameters.)
nfsstat

Correct Answer:

 

Question 21

FILL BLANK -
What is the path to the global Post x configuration file? (Specify the full name of the file, including path.)

Correct Answer: etc/post x/main.cf

 

Question 22

In a PAM configuration file, which of the following is true about the required control flag?

A. If the module returns success, no more modules of the same type will be invoked

B. The success of the module is needed for the module-type facility to succeed. If it returns a failure, control is returned to the calling application

C. The success of the module is needed for the module-type facility to succeed. However, all remaining modules of the same type will be invoked

D. The module is not critical and whether it returns success or failure is not important

E. If the module returns failure, no more modules of the same type will be invoked C

 


Correct Answer: C

Question 23

Which of the following OpenVPN configuration options makes OpenVPN forward network packets between VPN clients itself instead of passing the packets on to the Linux host which runs the OpenVPN server for further processing?

A. inter-client-traffic

B. client-to-client

C. client-router

D. client-pass

E. grant-client-traffic

 


Correct Answer: B

Question 24

Topic 2
Fill in the blank.
What command creates a SSH key pair? (Specify ONLY the command without any path or parameters)
ssh-keygen

Correct Answer:

 

Question 25

How must Samba be configured such that it can check CIFS passwords against those found in /etc/passwd and /etc/shadow?

A. Set the parameters “encrypt passwords = yes” and “password file = /etc/passwd”

B. Set the parameters “encrypt passwords = yes”, “password file = /etc/passwd” and “password algorithm = crypt”

C. Delete the smbpasswd file and create a symbolic link to the passwd and shadow file

D. It is not possible for Samba to use /etc/passwd and /etc/shadow directly

E. Run smbpasswd to convert /etc/passwd and /etc/shadow to a Samba password file D

 


Correct Answer: D

Question 26

In which CIFS share must printer drivers be placed to allow Point'n'Print driver deployment on Windows?

A. winx64drv$

B. print$

C. The name of the share is speci ed in the option print driver share within each printable share in smb.conf

D. pnpdrivers$

E. NETLOGON

 


Correct Answer: B

Question 27

After the installation of Dovecot, it is observed that the dovecot processes are shown in ps ax like this:

In order to associate the processes with users and peers, the username, IP address of the peer and the connection status, which of the following options must be set?

A. –with-linux-extprocnames for ./configure when building Dovecot

B. sys.ps.allow_descriptions = 1 in sysct1.conf or /proc

C. proc.all.show_status = 1 in sysctl.conf or /proc

D. verbose_proctitle = yes in the Dovecot configuration

E. process_format = “%u %I %s” in the Dovecot configuration

 


Correct Answer: D

Question 28

Which tool creates a certificate Signing Request (CSR) for serving HTTPS with Apache HTTPD?

A. apachect1

B. certgen

C. cartool

D. httpsgen

E. openssl

 


Correct Answer: E

Question 29

Which option in named.conf speci es which host are permitted to ask for domain name information from the server?

A. allowed-hosts

B. accept-query

C. permit-query

D. allow-query

E. query-group

 


Correct Answer: D

Question 30

In a BIND zone file, what does the @ character indicate?

A. It’s the fully quali ed host name of the DNS server

B. It’s an alias for the e-mail address of the zone master

C. It’s the name of the zone as defined in the zone statement in named.conf

D. It’s used to create an alias between two CNAME entries

 


Correct Answer: C

Question 31

What is the purpose of DANE?

A. Verify the integrity of name information retrieved via DNS.

B. Allow secure dynamic DNS updates.

C. Invalidate name information stored on caching name servers to speed up DNS updates.

D. Discover which servers within a DNS domain offer a specific service.

E. Provide a way to verify the association of X 509 certificates to DNS host names.
eference: https://wiki.archlinux.org/index.php/DANE
Reference: https://wiki.archlinux.org/index.php/DANE

 


Correct Answer: R

Question 32

What is the name of the network security scanner project which, at the core, is a server with a set of network vulnerability tests?

A. NetMap

B. OpenVAS

C. Smartscan

D. Wireshark

 


Correct Answer: B

Question 33

The content of which local file has to be transmitted to a remote SSH server in order to be able to log into the remote server using SSH keys?

A. ~/.ssh/authorized_keys

B. ~/.ssh/config

C. ~/.ssh/id_rsa.pub

D. ~/.ssh/id_rsa

E. ~./ssh/known_hosts
eference: https://www.digitalocean.com/community/tutorials/ssh-essentials-working-with-ssh-servers-clients-and-keys Community vote distribution
Reference: https://www.digitalocean.com/community/tutorials/ssh-essentials-working-with-ssh-servers-clients-and-keys Community vote distribution

 


Correct Answer: R

Question 34

Which Apache HTTPD configuration directive is used to specify the method of authentication, e.g. None or Basic?

A. AuthUser

B. AllowedAuthUser

C. AuthType

D. AllowAuth
eference: https://httpd.apache.org/docs/2.4/howto/auth.html
Reference: https://httpd.apache.org/docs/2.4/howto/auth.html

 


Correct Answer: R

Question 35

What does the samba-tool testparm command confirm regarding the Samba configuration?

A. The configuration loads successfully.

B. The service operates as expected.

C. The Samba services are started automatically when the system boots.

D. The net filter configuration on the Samba server does not block any access to the services defined in the configuration.

E. All running Samba processes use the most recent configuration version.
eference: https://www.samba.org/samba/docs/current/man-html/testparm.1.html Community vote distribution
Reference: https://www.samba.org/samba/docs/current/man-html/testparm.1.html Community vote distribution

 


Correct Answer: R

Question 36

Select the Samba option below that should be used if the main intention is to setup a guest printer service?

A. security = cups

B. security = ldap

C. security = pam

D. security = share

E. security = printing

 


Correct Answer: D

Question 37

Which of the following commands is used to change user passwords in an OpenLDAP directory?

A. setent

B. ldpasswd

C. olppasswd

D. ldappasswd

E. ldapchpw

 


Correct Answer: D

Question 38

Which of the following Samba configuration parameters is functionally identical to the parameter read only=yes?

A. browseable=no

B. read write=no

C. writeable=no

D. write only=no

E. write access=no

 


Correct Answer: C

Question 39

Which command is used to configure which file systems a NFS server makes available to clients?

A. exportfs

B. mkfs.nfs

C. mount

D. nfsservct1

E. telinit

 


Correct Answer: A

Question 40

When are Sieve lters usually applied to an email?

A. When the email is delivered to a mailbox

B. When the email is relayed by an SMTP server

C. When the email is received by an SMTP smarthost

D. When the email is sent to the first server by an MUA

E. When the email is retrieved by an MUA

 


Correct Answer: A

Question 41

What is DNSSEC used for?

A. Encrypted DNS queries between nameservers

B. Cryptographic authentication of DNS zones

C. Secondary DNS queries for local zones

D. Authentication of the user that initiated the DNS query

E. Encrypting DNS queries and answers

 


Correct Answer: B

Question 42

In order to protect a directory on an Apache HTTPD web server with a password, this configuration was added to an .htaccess file in the respective directory:


Furthermore, a file /var/www/dir/ .htpasswd was created with the following content: usera:S3cr3t Given that all these files were correctly processed by the web server processes, which of the following statements is true about requests to the directory?

A. The user usera can access the site using the password s3cr3t

B. Accessing the directory as usera raises HTTP error code 442 (User Not Existent)

C. Requests are answered with HTTP error code 500 (Internal Server Error)

D. The browser prompts the visitor for a username and password but logins for usera do not seem to work

E. The web server delivers the content of the directory without requesting authentication A

 


Correct Answer: D

Question 43

Which of the following commands displays an overview of the Post x queue content to help identify remote sites that are causing excessive mail traffic?

A. mailtraf

B. queuequery

C. qshape

D. postmap

E. poststats

 


Correct Answer: C

Question 44

Which of the following statements in the ISC DHCPD configuration is used to specify whether or not an address pool can be used by nodes which have a corresponding host section in the configuration?

A. identified-nodes

B. unconfigured-hosts

C. missing-peers

D. unmatched-hwaddr

E. unknown-clients

 


Correct Answer: E

Question 45

Which of the following statements are true regarding Server Name Indication (SNI)? (Choose two.)

A. It supports transparent failover of TLS sessions from one web server to another.

B. It allows multiple SSL/TLS secured virtual HTTP hosts to coexist on the same IP address.

C. It enables HTTP servers to update the DNS of their virtual hosts’ names using the X 509 certificates of the virtual hosts.

D. It provides a list of available virtual hosts to the client during the TLS handshake.

E. It submits the host name of the requested URL during the TLS handshake.

 


Correct Answer: BE

Question 46

Performing a DNS lookup with dig results in this answer:

A. There is no . after linuserv.example.net in the PTR record in the forward lookup zone file

B. There is no . after linuserv in the PTR record in the forward lookup zone file

C. There is no . after linuserv.example.net in the PTR record in the reverse lookup zone file

D. The . in the NS definition in the reverse lookup zone has to be removed

 


Correct Answer: C

Question 47

With Nginx, which of the following directives is used to proxy requests to a FastCGI application?

A. fastcgi_pass

B. fastcgi_proxy

C. proxy_fastcgi

D. proxy_fastcgi_pass

E. fastcgi_forward

 


Correct Answer: A

Question 48

Which of the following are logging directives in Apache HTTPD? (Choose two.)

A. TransferLog

B. CustomLog

C. ErrorLog

D. ServerLog

E. VHostLog
eference: http://httpd.apache.org/docs/current/mod/mod_log_config.html
Reference: http://httpd.apache.org/docs/current/mod/mod_log_config.html

 


Correct Answer: R

Question 49

A user requests a "hidden" Samba share, named con dential, similar to the Windows Administration Share. How can this be configured?

A. IMAGE”202-450 Exam ITE-8_5.jpg” width=”262″ height=”206″>

B. IMAGE”202-450 Exam ITE-8_6.jpg” width=”253″ height=”197″>

C. IMAGE”202-450 Exam ITE-8_7.jpg” width=”268″ height=”200″>

D. IMAGE”202-450 Exam ITE-8_8.jpg” width=”257″ height=”204″>

E. IMAGE”202-450 Exam ITE-8_9.jpg” width=”252″ height=”201″>

 


Correct Answer: E

Question 50

Which of the following actions synchronizes UNIX passwords with the Samba passwords when the encrypted Samba password is changed using smbpasswd?

A. There are no actions to accomplish this since is not possible.

B. Run netvamp regularly, to convert the passwords.

C. Run winbind “”sync, to synchronize the passwords.

D. Add unix password sync = yes to smb.conf

E. Add smb unix password = sync to smb.conf

 


Correct Answer: D

Free Access Full 202-450 Practice Exam Free

Looking for additional practice? Click here to access a full set of 202-450 practice exam free questions and continue building your skills across all exam domains.

Our question sets are updated regularly to ensure they stay aligned with the latest exam objectives—so be sure to visit often!

Good luck with your 202-450 certification journey!

Share18Tweet11
Previous Post

201-450 Practice Exam Free

Next Post

212-89 Practice Exam Free

Next Post

212-89 Practice Exam Free

220-1001 Practice Exam Free

220-1002 Practice Exam Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.