Nicht aus der Schweiz? Besuchen Sie lehmanns.de
CompTIA Linux+ XK0-005 Exam Cram - William Rothwell

CompTIA Linux+ XK0-005 Exam Cram

Buch | Softcover
496 Seiten
2022
Pearson IT Certification (Verlag)
978-0-13-789855-8 (ISBN)
CHF 75,70 inkl. MwSt
CompTIA® Linux+ XK0-005 Exam Cram is an all-inclusive study guide designed to help you pass the updated version of the CompTIA Linux+ exam. Prepare for test day success with complete coverage of exam objectives and topics, plus hundreds of realistic practice questions. Extensive prep tools include quizzes, Exam Alerts, and our essential last-minute review CramSheet. The powerful Pearson Test Prep practice software provides real-time assessment and feedback with two complete exams.

 

Covers the critical information needed to score higher on your Linux+ XK0-005 exam!

 



Manage files and directories
Configure and manage storage
Manage software configurations
Implement identity management
Implement and configure firewalls
Create simple shell scripts to automate common tasks
Perform basic container operations
Analyze and troubleshoot storage issues and network resource issues

 

Prepare for your exam with Pearson Test Prep

 



Realistic practice questions and answers
Comprehensive reporting and feedback
Customized testing in study, practice exam, or flash card modes
Complete coverage of Linux+ XK0-005 exam objectives

At the impressionable age of 14, William “Bo” Rothwell crossed paths with a TRS-80 Micro Computer System (affectionately known as a “Trash 80”). Soon after the adults responsible for Bo made the mistake of leaving him alone with the TSR-80, he dismantled it and held his first computer class, showing his friends what made this “computer thing” work.   Since that experience, Bo's passion for understanding how computers work and sharing this knowledge with others has resulted in a rewarding career in IT training. His experience includes Linux, Unix, IT security, DevOps, cloud technologies, and programming languages such as Perl, Python, Tcl, and BASH. He is the founder and lead instructor of One Course Source, an IT training organization.

    Introduction. . . . . . . . . . . . xxiv

 

Part I: System Management

CHAPTER 1: Linux Fundamentals. . . . . . . . . . . 1

    Filesystem Hierarchy Standard (FHS).. . . . . . . 1

    Basic Boot Process.. . . . . . . . . . 3

    Kernel Panic. . . . . . . . . . . 10

    Device Types in /dev.. . . . . . . . . 10

    Basic Package Compilation from Source.. . . . . . 13

    ./configure.. . . . . . . . . . 13

    make.. . . . . . . . . . . 15

    make install.. . . . . . . . . . 16

    Storage Concepts.. . . . . . . . . . 16

    Listing Hardware Information.. . . . . . . . 22

 

CHAPTER 2: Manage Files and Directories.. . . . . . . . . 27

    File Editing.. . . . . . . . . . . 27

    File Compression, Archiving, and Backup. . . . . . 36

    File Metadata.. . . . . . . . . . . 41

    Soft and Hard Links.. . . . . . . . . 43

    Copying Files Between Systems.. . . . . . . 46

    File and Directory Operations.. . . . . . . . 49

 

CHAPTER 3: Configure and Manage Storage Using the Appropriate Tools.. . . 57

    Disk Partitioning.. . . . . . . . . . 57

    Mounting Local and Remote Devices.. . . . . . 61

    Filesystem Management. . . . . . . . . 66

    Monitoring Storage Space and Disk Usage. . . . . . 70

    Creating and Modifying Volumes Using Logical Volume Manager (LVM).. . . . . . . . . . 71

    Inspecting RAID Implementations.. . . . . . . 75

    Storage Area Network (SAN)/Network-Attached Storage (NAS). . 78

    Storage Hardware.. . . . . . . . . . 82

 

CHAPTER 4: Configure and Use the Appropriate Processes and Services.. . . 85

    System Services. . . . . . . . . . 85

    Scheduling Services. . . . . . . . . . 90

    Process Management. . . . . . . . . 97

 

CHAPTER 5: Use the Appropriate Networking Tools or Configuration Files. . . 113

    Interface Management.. . . . . . . . . 113

    Name Resolution.. . . . . . . . . . 122

    Network Monitoring.. . . . . . . . . 127

    Remote Networking Tools.. . . . . . . . 132

 

CHAPTER 6: Build and Install Software. . . . . . . . . 139

    Package Management.. . . . . . . . . 139

    Sandboxed Applications.. . . . . . . . . 149

    System Updates.. . . . . . . . . . 150

 

Part II: Security

CHAPTER 7: Manage Software Configurations.. . . . . . . . 155

    Updating Configuration Files.. . . . . . . . 155

    Configure Kernel Options.. . . . . . . . 158

    Configure Common System Services.. . . . . . . 165

    Localization.. . . . . . . . . . . 172

 

CHAPTER 8: Security Best Practices in a Linux Environment.. . . . . 177

    Managing Public Key Infrastructure (PKI) Certificates.. . . 177

    Certificate Use Cases. . . . . . . . . 181

    Authentication.. . . . . . . . . . 181

    Linux Hardening.. . . . . . . . . . 188

 

CHAPTER 9: Implement Identity Management. . . . . . . . 201

    Account Creation and Deletion. . . . . . . . 201

    .bashrc. . . . . . . . . . . 212

    Account Management.. . . . . . . . . 212

 

CHAPTER 10: Implement and Configure Firewalls.. . . . . . . . 219

    Firewall Use Cases.. . . . . . . . . . 219

    Common Firewall Technologies.. . . . . . . 221

    Key Firewall Features.. . . . . . . . . 223

 

CHAPTER 11: Configure and Execute Remote Connectivity for System Management.. 227

    SSH.. . . . . . . . . . . . 227

    Executing Commands as Another User.. . . . . . 235

 

CHAPTER 12: Apply the Appropriate Access Controls. . . . . . . 241

    File Permissions.. . . . . . . . . . 241

    Security-Enhanced Linux (SELinux).. . . . . . . 243

    AppArmor.. . . . . . . . . . . 247

    Command-Line Utilities.. . . . . . . . . 250

 

Part III: Scripting, Containers, and Automation

CHAPTER 13: Create Simple Shell Scripts to Automate Common Tasks. . . . 265

    Shell Script Elements.. . . . . . . . . 265

    Common Script Utilities.. . . . . . . . . 286

    Environment Variables. . . . . . . . . 298

    Relative and Absolute Paths.. . . . . . . . 302

 

CHAPTER 14: Perform Basic Container Operations. . . . . . . 305

    Container Management.. . . . . . . . . 305

    Container Image Operations.. . . . . . . . 312

 

CHAPTER 15: Perform Basic Version Control Using Git.. . . . . . . 317

    Introduction to Version Control and Git.. . . . . . 317

    clone.. . . . . . . . . . . . 321

    push.. . . . . . . . . . . . 323

    pull.. . . . . . . . . . . . 324

    commit.. . . . . . . . . . . . 324

    add.. . . . . . . . . . . . 325

    branch/checkout.. . . . . . . . . . 325

    tag.. . . . . . . . . . . . 329

    gitignore.. . . . . . . . . . . 330

 

CHAPTER 16: Common Infrastructure as Code Technologies.. . . . . 333

    File Formats. . . . . . . . . . . 334

    Utilities.. . . . . . . . . . . . 335

    Continuous Integration/Continuous Deployment (CI/CD).. . . 338

    Advanced Git Topics.. . . . . . . . . 339

 

CHAPTER 17: Container, Cloud, and Orchestration Concepts.. . . . . 343

    Kubernetes Benefits and Application Use Cases.. . . . . 344

    Single-Node, Multicontainer Use Cases. . . . . . 346

    Container Persistent Storage.. . . . . . . . 346

    Container Networks.. . . . . . . . . 347

    Service Mesh.. . . . . . . . . . . 349

    Bootstrapping. . . . . . . . . . . 350

    Container Registries.. . . . . . . . . 350

 

Part IV: Troubleshooting

CHAPTER 18: Analyze and Troubleshoot Storage Issues.. . . . . . 353

    High Latency.. . . . . . . . . . . 353

    Input/Output Operations per Second (IOPS) Scenarios.. . . 354

    Capacity Issues.. . . . . . . . . . 355

    Filesystem Issues. . . . . . . . . . 358

    I/O Scheduler. . . . . . . . . . . 359

    Device Issues.. . . . . . . . . . . 360

    Mount Option Problems.. . . . . . . . . 363

 

CHAPTER 19: Analyze and Troubleshoot Network Resource Issues.. . . . 365

    Network Configuration Issues.. . . . . . . . 365

    Firewall Issues.. . . . . . . . . . 367

    Interface Errors.. . . . . . . . . . 367

    Bandwidth Limitations. . . . . . . . . 373

    Name Resolution Issues. . . . . . . . . 374

    Testing Remote Systems.. . . . . . . . . 375

 

CHAPTER 20: Analyze and Troubleshoot Central Processing Unit (CPU) and Memory Issues. . . . 379

    Runaway Processes.. . . . . . . . . . 379

    Zombie Processes.. . . . . . . . . . 380

    High Load Average.. . . . . . . . . . 383

    High Run Queues.. . . . . . . . . . 384

    CPU Times.. . . . . . . . . . . 384

    CPU Process Priorities.. . . . . . . . . 384

    Memory Exhaustion.. . . . . . . . . 385

    Out of Memory (OOM). . . . . . . . . 385

    Swapping.. . . . . . . . . . . 386

    Hardware. . . . . . . . . . . 388

 

CHAPTER 21: Analyze and Troubleshoot User Access and File Permissions. . . 397

    User Login Issues.. . . . . . . . . . 397

    User File Access Issues. . . . . . . . . 400

    Password Issues. . . . . . . . . . 404

    Privilege Elevation.. . . . . . . . . . 405

    Quota Issues. . . . . . . . . . . 405

 

CHAPTER 22: Use systemd to Diagnose and Resolve Common Problems with a Linux System. . . . . 411

    Unit Files. . . . . . . . . . . 412

    Common Problems.. . . . . . . . . . 429

 

9780137898558, TOC, 8/11/2022

Erscheinungsdatum
Reihe/Serie Exam Cram
Verlagsort Upper Saddle River
Sprache englisch
Maße 154 x 228 mm
Gewicht 680 g
Themenwelt Informatik Betriebssysteme / Server Unix / Linux
Informatik Weitere Themen Zertifizierung
ISBN-10 0-13-789855-X / 013789855X
ISBN-13 978-0-13-789855-8 / 9780137898558
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Die wichtigen Befehle

von Daniel J. Barrett

Buch | Softcover (2024)
O'Reilly (Verlag)
CHF 23,65
das umfassende Handbuch

von Dirk Deimeke; Daniel van Soest; Stefan Kania

Buch | Hardcover (2023)
Rheinwerk (Verlag)
CHF 97,85
das umfassende Handbuch

von Michael Kofler

Buch | Hardcover (2023)
Rheinwerk (Verlag)
CHF 69,85