CompTIA Linux+ XK0-005 Exam Cram Premium Edition and Practice Test
Pearson Education (US)
978-0-13-789842-8 (ISBN)
- Titel nicht im Sortiment
- Artikel merken
The exciting new CompTIA Linux+ XK0-005 Exam Cram Premium Edition and Practice Test is a digital-only certification preparation product combining an eBook with enhanced Pearson IT Certification Practice Test. The Premium Edition eBook and Practice Test contains the following items:
The CompTIA Linux+ XK0-005 Exam Cram Premium Edition Practice Test, including four full practice exams and enhanced practice test features
PDF, EPUB, and Mobi/Kindle formats of the CompTIA Linux+ XK0-005 Exam Cram from Pearson IT Certification, which are accessible via your PC, tablet, and smartphone
About the Premium Edition Practice Test
This Premium Edition contains an enhanced version of the Pearson Test Prep practice test software with four full practice exams. This integrated learning package
Allows you to focus on individual topic areas or take complete, timed exams
Includes direct links from each question to detailed tutorials to help you understand the concepts behind the questions
Provides unique sets of exam-realistic practice questions
Tracks your performance and provides feedback on a module-by-module basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most
Pearson Test Prep online system requirements
Browsers: Chrome version 73 and above, Safari version 12 and above, Microsoft Edge 44 and above.
Devices: Desktop and laptop computers, tablets running Android v8.0 and above or iPadOS v13 and above, smartphones running Android v8.0 and above or iOS v13 and above with a minimum screen size of 4.7”.
Internet access required.
Pearson Test Prep offline system requirements
Windows 10, Windows 8.1; Microsoft .NET Framework 4.5 Client; Pentium-class 1 GHz processor (or equivalent); 512 MB RAM; 650 MB disk space plus 50 MB for each downloaded practice exam; access to the Internet to register and download exam databases
About the Premium Edition eBook
Covers the critical information needed to score higher on your Linux+ XK0-005 exam!
Manage files and directories
Configure and manage storage
Manage software configurations
Implement identity management
Implement and configure firewalls
Create simple shell scripts to automate common tasks
Perform basic container operations
Analyze and troubleshoot storage issues and network resource issues
Introduction. . . . . . . . . . . . xxiv
Part I: System Management
CHAPTER 1: Linux Fundamentals. . . . . . . . . . . 1
Filesystem Hierarchy Standard (FHS).. . . . . . . 1
Basic Boot Process.. . . . . . . . . . 3
Kernel Panic. . . . . . . . . . . 10
Device Types in /dev.. . . . . . . . . 10
Basic Package Compilation from Source.. . . . . . 13
./configure.. . . . . . . . . . 13
make.. . . . . . . . . . . 15
make install.. . . . . . . . . . 16
Storage Concepts.. . . . . . . . . . 16
Listing Hardware Information.. . . . . . . . 22
CHAPTER 2: Manage Files and Directories.. . . . . . . . . 27
File Editing.. . . . . . . . . . . 27
File Compression, Archiving, and Backup. . . . . . 36
File Metadata.. . . . . . . . . . . 41
Soft and Hard Links.. . . . . . . . . 43
Copying Files Between Systems.. . . . . . . 46
File and Directory Operations.. . . . . . . . 49
CHAPTER 3: Configure and Manage Storage Using the Appropriate Tools.. . . 57
Disk Partitioning.. . . . . . . . . . 57
Mounting Local and Remote Devices.. . . . . . 61
Filesystem Management. . . . . . . . . 66
Monitoring Storage Space and Disk Usage. . . . . . 70
Creating and Modifying Volumes Using Logical Volume Manager (LVM).. . . . . . . . . . 71
Inspecting RAID Implementations.. . . . . . . 75
Storage Area Network (SAN)/Network-Attached Storage (NAS). . 78
Storage Hardware.. . . . . . . . . . 82
CHAPTER 4: Configure and Use the Appropriate Processes and Services.. . . 85
System Services. . . . . . . . . . 85
Scheduling Services. . . . . . . . . . 90
Process Management. . . . . . . . . 97
CHAPTER 5: Use the Appropriate Networking Tools or Configuration Files. . . 113
Interface Management.. . . . . . . . . 113
Name Resolution.. . . . . . . . . . 122
Network Monitoring.. . . . . . . . . 127
Remote Networking Tools.. . . . . . . . 132
CHAPTER 6: Build and Install Software. . . . . . . . . 139
Package Management.. . . . . . . . . 139
Sandboxed Applications.. . . . . . . . . 149
System Updates.. . . . . . . . . . 150
Part II: Security
CHAPTER 7: Manage Software Configurations.. . . . . . . . 155
Updating Configuration Files.. . . . . . . . 155
Configure Kernel Options.. . . . . . . . 158
Configure Common System Services.. . . . . . . 165
Localization.. . . . . . . . . . . 172
CHAPTER 8: Security Best Practices in a Linux Environment.. . . . . 177
Managing Public Key Infrastructure (PKI) Certificates.. . . 177
Certificate Use Cases. . . . . . . . . 181
Authentication.. . . . . . . . . . 181
Linux Hardening.. . . . . . . . . . 188
CHAPTER 9: Implement Identity Management. . . . . . . . 201
Account Creation and Deletion. . . . . . . . 201
.bashrc. . . . . . . . . . . 212
Account Management.. . . . . . . . . 212
CHAPTER 10: Implement and Configure Firewalls.. . . . . . . . 219
Firewall Use Cases.. . . . . . . . . . 219
Common Firewall Technologies.. . . . . . . 221
Key Firewall Features.. . . . . . . . . 223
CHAPTER 11: Configure and Execute Remote Connectivity for System Management.. 227
SSH.. . . . . . . . . . . . 227
Executing Commands as Another User.. . . . . . 235
CHAPTER 12: Apply the Appropriate Access Controls. . . . . . . 241
File Permissions.. . . . . . . . . . 241
Security-Enhanced Linux (SELinux).. . . . . . . 243
AppArmor.. . . . . . . . . . . 247
Command-Line Utilities.. . . . . . . . . 250
Part III: Scripting, Containers, and Automation
CHAPTER 13: Create Simple Shell Scripts to Automate Common Tasks. . . . 265
Shell Script Elements.. . . . . . . . . 265
Common Script Utilities.. . . . . . . . . 286
Environment Variables. . . . . . . . . 298
Relative and Absolute Paths.. . . . . . . . 302
CHAPTER 14: Perform Basic Container Operations. . . . . . . 305
Container Management.. . . . . . . . . 305
Container Image Operations.. . . . . . . . 312
CHAPTER 15: Perform Basic Version Control Using Git.. . . . . . . 317
Introduction to Version Control and Git.. . . . . . 317
clone.. . . . . . . . . . . . 321
push.. . . . . . . . . . . . 323
pull.. . . . . . . . . . . . 324
commit.. . . . . . . . . . . . 324
add.. . . . . . . . . . . . 325
branch/checkout.. . . . . . . . . . 325
tag.. . . . . . . . . . . . 329
gitignore.. . . . . . . . . . . 330
CHAPTER 16: Common Infrastructure as Code Technologies.. . . . . 333
File Formats. . . . . . . . . . . 334
Utilities.. . . . . . . . . . . . 335
Continuous Integration/Continuous Deployment (CI/CD).. . . 338
Advanced Git Topics.. . . . . . . . . 339
CHAPTER 17: Container, Cloud, and Orchestration Concepts.. . . . . 343
Kubernetes Benefits and Application Use Cases.. . . . . 344
Single-Node, Multicontainer Use Cases. . . . . . 346
Container Persistent Storage.. . . . . . . . 346
Container Networks.. . . . . . . . . 347
Service Mesh.. . . . . . . . . . . 349
Bootstrapping. . . . . . . . . . . 350
Container Registries.. . . . . . . . . 350
Part IV: Troubleshooting
CHAPTER 18: Analyze and Troubleshoot Storage Issues.. . . . . . 353
High Latency.. . . . . . . . . . . 353
Input/Output Operations per Second (IOPS) Scenarios.. . . 354
Capacity Issues.. . . . . . . . . . 355
Filesystem Issues. . . . . . . . . . 358
I/O Scheduler. . . . . . . . . . . 359
Device Issues.. . . . . . . . . . . 360
Mount Option Problems.. . . . . . . . . 363
CHAPTER 19: Analyze and Troubleshoot Network Resource Issues.. . . . 365
Network Configuration Issues.. . . . . . . . 365
Firewall Issues.. . . . . . . . . . 367
Interface Errors.. . . . . . . . . . 367
Bandwidth Limitations. . . . . . . . . 373
Name Resolution Issues. . . . . . . . . 374
Testing Remote Systems.. . . . . . . . . 375
CHAPTER 20: Analyze and Troubleshoot Central Processing Unit (CPU) and Memory Issues. . . . 379
Runaway Processes.. . . . . . . . . . 379
Zombie Processes.. . . . . . . . . . 380
High Load Average.. . . . . . . . . . 383
High Run Queues.. . . . . . . . . . 384
CPU Times.. . . . . . . . . . . 384
CPU Process Priorities.. . . . . . . . . 384
Memory Exhaustion.. . . . . . . . . 385
Out of Memory (OOM). . . . . . . . . 385
Swapping.. . . . . . . . . . . 386
Hardware. . . . . . . . . . . 388
CHAPTER 21: Analyze and Troubleshoot User Access and File Permissions. . . 397
User Login Issues.. . . . . . . . . . 397
User File Access Issues. . . . . . . . . 400
Password Issues. . . . . . . . . . 404
Privilege Elevation.. . . . . . . . . . 405
Quota Issues. . . . . . . . . . . 405
CHAPTER 22: Use systemd to Diagnose and Resolve Common Problems with a Linux System. . . . . 411
Unit Files. . . . . . . . . . . 412
Common Problems.. . . . . . . . . . 429
9780137898558, TOC, 8/11/2022
Erscheint lt. Verlag | 11.10.2022 |
---|---|
Verlagsort | Upper Saddle River |
Sprache | englisch |
ISBN-10 | 0-13-789842-8 / 0137898428 |
ISBN-13 | 978-0-13-789842-8 / 9780137898428 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |