New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

LPI 202-450 Exam - Topic 5 Question 16 Discussion

Actual exam question for LPI's 202-450 exam
Question #: 16
Topic #: 5
[All 202-450 Questions]

Using its standard configuration, how does fail2ban block offending SSH clients?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Gene
4 months ago
I always thought it was null routes. Interesting!
upvoted 0 times
...
Gilberto
4 months ago
Nope, definitely not modifying SSHD config.
upvoted 0 times
...
Thaddeus
4 months ago
Wait, I thought it was a proxy?
upvoted 0 times
...
Bernardine
4 months ago
Totally agree, it's all about those iptables rules!
upvoted 0 times
...
Hermila
5 months ago
Fail2ban blocks SSH clients by creating netfilter rules.
upvoted 0 times
...
Leota
5 months ago
I'm leaning towards the netfilter rules option too, but I can't shake the feeling that there was something about rejecting connections as a proxy.
upvoted 0 times
...
Isadora
5 months ago
I feel like the answer might be about netfilter rules, but I also vaguely recall something about TCP Wrapper.
upvoted 0 times
...
Tonette
5 months ago
I remember practicing a question about fail2ban, and I think it was related to modifying SSHD configuration, but that doesn't seem right for this one.
upvoted 0 times
...
Blondell
5 months ago
I think fail2ban blocks SSH clients by creating netfilter rules, but I'm not entirely sure if that's the only method it uses.
upvoted 0 times
...
Lanie
5 months ago
Hmm, this is a tricky one. I'm leaning towards option C, since that sounds like a one-on-one coaching engagement, which seems like the kind of "accelerator" service they might offer. But I'm not completely confident.
upvoted 0 times
...
Leslie
5 months ago
Ah, I see now. File storage is the way to go for organizing data in a hierarchical structure on a NAS device. I'll select that option.
upvoted 0 times
...
Leoma
5 months ago
This is a good test of our understanding of basic insurance concepts. I'm going to carefully read through the question again, think it through step-by-step, and then select the answer I'm most confident in.
upvoted 0 times
...
Willow
5 months ago
This looks like a straightforward question about the components of an Audit Configuration file. I think the answer is DataExtractors, since that component is responsible for taking input data and producing some kind of output.
upvoted 0 times
...
Tomislav H
2 years ago
fail2ban doesn't change configuration, it uses iptables or some script on behalf of iptables, so C is the correct answer
upvoted 1 times
...

Save Cancel