Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

LPI 202-450 Exam - Topic 7 Question 110 Discussion

Actual exam question for LPI's 202-450 exam
Question #: 110
Topic #: 7
[All 202-450 Questions]

When the default policy for the netfilter INPUT chain is set to DROP, why should a rule allowing traffic to localhost exist?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Gail
4 months ago
Some apps really do rely on localhost for communication.
upvoted 0 times
...
Ryan
4 months ago
Wait, I thought localhost was always open?
upvoted 0 times
...
Yuki
4 months ago
All traffic to localhost must always be allowed.
upvoted 0 times
...
Cherelle
4 months ago
Definitely need rules for localhost traffic!
upvoted 0 times
...
Kenia
4 months ago
I disagree, it can be managed differently.
upvoted 0 times
...
Mozell
5 months ago
I vaguely recall something about syslogd using localhost for messages, but I can't remember if that's the main reason we need to allow that traffic. Is that option D?
upvoted 0 times
...
Inocencia
5 months ago
I'm a bit confused; I thought netfilter didn't affect localhost at all, but maybe that's not correct? I should probably double-check that.
upvoted 0 times
...
Maryann
5 months ago
I feel like I saw a question similar to this in practice, and it was about how netfilter handles localhost traffic. I think it might be option C?
upvoted 0 times
...
Kaycee
5 months ago
I think I remember that localhost traffic needs to be allowed because some applications rely on it to communicate, but I'm not entirely sure which option that is.
upvoted 0 times
...
Tarra
5 months ago
The iptables command communicating with netfilterd on localhost - that's an interesting detail. I'll make sure to keep that in mind as I work through this question.
upvoted 0 times
...
Maurine
6 months ago
All traffic to localhost should always be allowed? That doesn't sound right to me. I'll need to read the question more closely and consider the other options.
upvoted 0 times
...
Alease
6 months ago
Okay, the key here is that some applications use localhost to communicate, so we need a rule to allow that traffic even with a DROP default policy. I think I've got a good strategy for this.
upvoted 0 times
...
Lasandra
6 months ago
Hmm, I'm a bit confused about the relationship between the default policy and localhost traffic. I'll need to think this through carefully.
upvoted 0 times
...
Nikita
6 months ago
This seems like a pretty straightforward question about netfilter and localhost traffic. I'm confident I can figure this out.
upvoted 0 times
...
Rosamond
11 months ago
B is just plain wrong. Of course netfilter affects localhost traffic, it's not some magical exception zone.
upvoted 0 times
Kristal
9 months ago
D) syslogd receives messages on localhost
upvoted 0 times
...
Fabiola
9 months ago
C) Some applications use the localhost interface to communicate with other applications
upvoted 0 times
...
Nobuko
10 months ago
A) All traffic to localhost must always be allowed
upvoted 0 times
...
...
Oretha
11 months ago
I think E is the funniest answer. Netfilterd is my new favorite daemon, sounds like a superhero!
upvoted 0 times
Rupert
9 months ago
D) syslogd receives messages on localhost
upvoted 0 times
...
Bong
9 months ago
A) All traffic to localhost must always be allowed
upvoted 0 times
...
Elena
10 months ago
C) Some applications use the localhost interface to communicate with other applications
upvoted 0 times
...
...
Pamella
11 months ago
D is also a valid answer. The syslog daemon needs to receive messages on localhost to log system events.
upvoted 0 times
Venita
10 months ago
D) syslogd receives messages on localhost
upvoted 0 times
...
Quentin
10 months ago
E) The iptables command communicates with the netfilter management daemon netfilterd on localhost to create and change packet filter rules
upvoted 0 times
...
Elouise
10 months ago
C) Some applications use the localhost interface to communicate with other applications
upvoted 0 times
...
...
Graciela
11 months ago
But what about option B? Doesn't netfilter never affect packets addressed to localhost anyway?
upvoted 0 times
...
Eleonore
12 months ago
I agree with Josue. It's important to allow traffic to localhost for certain applications to function properly.
upvoted 0 times
...
Josue
12 months ago
I think a rule allowing traffic to localhost should exist because some applications use the localhost interface to communicate with other applications.
upvoted 0 times
...
Carey
1 year ago
C is the correct answer. Applications like database servers often use the localhost interface for internal communication, so a rule allowing this traffic is necessary.
upvoted 0 times
Erick
10 months ago
D) syslogd receives messages on localhost
upvoted 0 times
...
Luke
10 months ago
A) All traffic to localhost must always be allowed
upvoted 0 times
...
Tonette
11 months ago
C) Some applications use the localhost interface to communicate with other applications
upvoted 0 times
...
Lucina
11 months ago
D) syslogd receives messages on localhost
upvoted 0 times
...
Lawrence
11 months ago
A) All traffic to localhost must always be allowed
upvoted 0 times
...
Linwood
11 months ago
C) Some applications use the localhost interface to communicate with other applications
upvoted 0 times
...
...

Save Cancel