Op werkdagen voor 23:00 besteld, morgen in huis Gratis verzending vanaf €20

CompTIA Linux+ XK0-005 Exam Cram

Specificaties
E-book, blz. | Engels
Pearson Education | e druk, 2022
ISBN13: 9780137898497
Rubricering
Juridisch :
Pearson Education e druk, 2022 9780137898497
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Prepare for CompTIA Linux+ XK0-005 exam success with this Exam Cram from Pearson IT Certification, a leader in IT certification.

 

This is the eBook edition of the CompTIA Linux+ XK0-005 Exam Cram. This eBook does not include access to the Pearson Test Prep practice exams that comes with the print edition.

 

CompTIA Linux+ XK0-005 Exam Cram is an all-inclusive study guide designed to help you pass the updated version of the CompTIA Linux+ exam. Prepare for test day success with complete coverage of exam objectives and topics, plus hundreds of realistic practice questions. Extensive prep tools include quizzes, Exam Alerts, and our essential last-minute review Cram Sheet.

 

Covers the critical information needed to score higher on your Linux+ XK0-005 exam! Manage files and directories Configure and manage storage Manage software configurations Implement identity management Implement and configure firewalls Create simple shell scripts to automate common tasks Perform basic container operations Analyze and troubleshoot storage issues and network resource issues

Specificaties

ISBN13:9780137898497
Taal:Engels
Bindwijze:e-book

Inhoudsopgave

<p>&nbsp;&nbsp;&nbsp; Introduction. . . . . . . . . . . . xxiv</p> <p>&nbsp;</p> <p><strong>Part I: System Management</strong></p> <p><strong>CHAPTER 1: </strong><strong>Linux Fundamentals</strong><strong>. . . . . . . . . . . </strong><strong>1</strong></p> <p>&nbsp;&nbsp;&nbsp; Filesystem Hierarchy Standard (FHS).. . . . . . . 1</p> <p>&nbsp;&nbsp;&nbsp; Basic Boot Process.. . . . . . . . . . 3</p> <p>&nbsp;&nbsp;&nbsp; Kernel Panic. . . . . . . . . . . 10</p> <p>&nbsp;&nbsp;&nbsp; Device Types in /dev.. . . . . . . . . 10</p> <p>&nbsp;&nbsp;&nbsp; Basic Package Compilation from Source.. . . . . . 13</p> <p>&nbsp;&nbsp;&nbsp; ./configure.. . . . . . . . . . 13</p> <p>&nbsp;&nbsp;&nbsp; make.. . . . . . . . . . . 15</p> <p>&nbsp;&nbsp;&nbsp; make install.. . . . . . . . . . 16</p> <p>&nbsp;&nbsp;&nbsp; Storage Concepts.. . . . . . . . . . 16</p> <p>&nbsp;&nbsp;&nbsp; Listing Hardware Information.. . . . . . . . 22</p> <p>&nbsp;</p> <p><strong>CHAPTER 2: </strong><strong>Manage Files and Directories</strong><strong>.. . . . . . . . . </strong><strong>27</strong></p> <p>&nbsp;&nbsp;&nbsp; File Editing.. . . . . . . . . . . 27</p> <p>&nbsp;&nbsp;&nbsp; File Compression, Archiving, and Backup. . . . . . 36</p> <p>&nbsp;&nbsp;&nbsp; File Metadata.. . . . . . . . . . . 41</p> <p>&nbsp;&nbsp;&nbsp; Soft and Hard Links.. . . . . . . . . 43</p> <p>&nbsp;&nbsp;&nbsp; Copying Files Between Systems.. . . . . . . 46</p> <p>&nbsp;&nbsp;&nbsp; File and Directory Operations.. . . . . . . . 49</p> <p>&nbsp;</p> <p><strong>CHAPTER 3: </strong><strong>Configure and Manage Storage Using the Appropriate Tools</strong><strong>.. . . </strong><strong>57</strong></p> <p>&nbsp;&nbsp;&nbsp; Disk Partitioning.. . . . . . . . . . 57</p> <p>&nbsp;&nbsp;&nbsp; Mounting Local and Remote Devices.. . . . . . 61</p> <p>&nbsp;&nbsp;&nbsp; Filesystem Management. . . . . . . . . 66</p> <p>&nbsp;&nbsp;&nbsp; Monitoring Storage Space and Disk Usage. . . . . . 70</p> <p>&nbsp;&nbsp;&nbsp; Creating and Modifying Volumes Using Logical Volume Manager (LVM).. . . . . . . . . . 71</p> <p>&nbsp;&nbsp;&nbsp; Inspecting RAID Implementations.. . . . . . . 75</p> <p>&nbsp;&nbsp;&nbsp; Storage Area Network (SAN)/Network-Attached Storage (NAS). . 78</p> <p>&nbsp;&nbsp;&nbsp; Storage Hardware.. . . . . . . . . . 82</p> <p>&nbsp;</p> <p><strong>CHAPTER 4: </strong><strong>Configure and Use the Appropriate Processes and Services</strong><strong>.. . . </strong><strong>85</strong></p> <p>&nbsp;&nbsp;&nbsp; System Services. . . . . . . . . . 85</p> <p>&nbsp;&nbsp;&nbsp; Scheduling Services. . . . . . . . . . 90</p> <p>&nbsp;&nbsp;&nbsp; Process Management. . . . . . . . . 97</p> <p>&nbsp;</p> <p><strong>CHAPTER 5: </strong><strong>Use the Appropriate Networking Tools or Configuration Files</strong><strong>. . . </strong><strong>113</strong></p> <p>&nbsp;&nbsp;&nbsp; Interface Management.. . . . . . . . . 113</p> <p>&nbsp;&nbsp;&nbsp; Name Resolution.. . . . . . . . . . 122</p> <p>&nbsp;&nbsp;&nbsp; Network Monitoring.. . . . . . . . . 127</p> <p>&nbsp;&nbsp;&nbsp; Remote Networking Tools.. . . . . . . . 132</p> <p>&nbsp;</p> <p><strong>CHAPTER 6: </strong><strong>Build and Install Software</strong><strong>. . . . . . . . . </strong><strong>139</strong></p> <p>&nbsp;&nbsp;&nbsp; Package Management.. . . . . . . . . 139</p> <p>&nbsp;&nbsp;&nbsp; Sandboxed Applications.. . . . . . . . . 149</p> <p>&nbsp;&nbsp;&nbsp; System Updates.. . . . . . . . . . 150</p> <p>&nbsp;</p> <p><strong>Part II: Security</strong></p> <p><strong>CHAPTER 7: </strong><strong>Manage Software Configurations</strong><strong>.. . . . . . . . </strong><strong>155</strong></p> <p>&nbsp;&nbsp;&nbsp; Updating Configuration Files.. . . . . . . . 155</p> <p>&nbsp;&nbsp;&nbsp; Configure Kernel Options.. . . . . . . . 158</p> <p>&nbsp;&nbsp;&nbsp; Configure Common System Services.. . . . . . . 165</p> <p>&nbsp;&nbsp;&nbsp; Localization.. . . . . . . . . . . 172</p> <p>&nbsp;</p> <p><strong>CHAPTER 8: </strong><strong>Security Best Practices in a Linux Environment</strong><strong>.. . . . . </strong><strong>177</strong></p> <p>&nbsp;&nbsp;&nbsp; Managing Public Key Infrastructure (PKI) Certificates.. . . 177</p> <p>&nbsp;&nbsp;&nbsp; Certificate Use Cases. . . . . . . . . 181</p> <p>&nbsp;&nbsp;&nbsp; Authentication.. . . . . . . . . . 181</p> <p>&nbsp;&nbsp;&nbsp; Linux Hardening.. . . . . . . . . . 188</p> <p>&nbsp;</p> <p><strong>CHAPTER 9: </strong><strong>Implement Identity Management</strong><strong>. . . . . . . . </strong><strong>201</strong></p> <p>&nbsp;&nbsp;&nbsp; Account Creation and Deletion. . . . . . . . 201</p> <p>&nbsp;&nbsp;&nbsp; .bashrc. . . . . . . . . . . 212</p> <p>&nbsp;&nbsp;&nbsp; Account Management.. . . . . . . . . 212</p> <p>&nbsp;</p> <p><strong>CHAPTER 10: </strong><strong>Implement and Configure Firewalls</strong><strong>.. . . . . . . . </strong><strong>219</strong></p> <p>&nbsp;&nbsp;&nbsp; Firewall Use Cases.. . . . . . . . . . 219</p> <p>&nbsp;&nbsp;&nbsp; Common Firewall Technologies.. . . . . . . 221</p> <p>&nbsp;&nbsp;&nbsp; Key Firewall Features.. . . . . . . . . 223</p> <p>&nbsp;</p> <p><strong>CHAPTER 11: </strong><strong>Configure and Execute Remote Connectivity for System Management</strong><strong>.. </strong><strong>227</strong></p> <p>&nbsp;&nbsp;&nbsp; SSH.. . . . . . . . . . . . 227</p> <p>&nbsp;&nbsp;&nbsp; Executing Commands as Another User.. . . . . . 235</p> <p>&nbsp;</p> <p><strong>CHAPTER 12: </strong><strong>Apply the Appropriate Access Controls</strong><strong>. . . . . . . </strong><strong>241</strong></p> <p>&nbsp;&nbsp;&nbsp; File Permissions.. . . . . . . . . . 241</p> <p>&nbsp;&nbsp;&nbsp; Security-Enhanced Linux (SELinux).. . . . . . . 243</p> <p>&nbsp;&nbsp;&nbsp; AppArmor.. . . . . . . . . . . 247</p> <p>&nbsp;&nbsp;&nbsp; Command-Line Utilities.. . . . . . . . . 250</p> <p>&nbsp;</p> <p><strong>Part III: Scripting, Containers, and Automation</strong></p> <p><strong>CHAPTER 13: </strong><strong>Create Simple Shell Scripts to Automate Common Tasks</strong><strong>. . . . </strong><strong>265</strong></p> <p>&nbsp;&nbsp;&nbsp; Shell Script Elements.. . . . . . . . . 265</p> <p>&nbsp;&nbsp;&nbsp; Common Script Utilities.. . . . . . . . . 286</p> <p>&nbsp;&nbsp;&nbsp; Environment Variables. . . . . . . . . 298</p> <p>&nbsp;&nbsp;&nbsp; Relative and Absolute Paths.. . . . . . . . 302</p> <p>&nbsp;</p> <p><strong>CHAPTER 14: </strong><strong>Perform Basic Container Operations</strong><strong>. . . . . . . </strong><strong>305</strong></p> <p>&nbsp;&nbsp;&nbsp; Container Management.. . . . . . . . . 305</p> <p>&nbsp;&nbsp;&nbsp; Container Image Operations.. . . . . . . . 312</p> <p>&nbsp;</p> <p><strong>CHAPTER 15: </strong><strong>Perform Basic Version Control Using Git</strong><strong>.. . . . . . . </strong><strong>317</strong></p> <p>&nbsp;&nbsp;&nbsp; Introduction to Version Control and Git.. . . . . . 317</p> <p>&nbsp;&nbsp;&nbsp; clone.. . . . . . . . . . . . 321</p> <p>&nbsp;&nbsp;&nbsp; push.. . . . . . . . . . . . 323</p> <p>&nbsp;&nbsp;&nbsp; pull.. . . . . . . . . . . . 324</p> <p>&nbsp;&nbsp;&nbsp; commit.. . . . . . . . . . . . 324</p> <p>&nbsp;&nbsp;&nbsp; add.. . . . . . . . . . . . 325</p> <p>&nbsp;&nbsp;&nbsp; branch/checkout.. . . . . . . . . . 325</p> <p>&nbsp;&nbsp;&nbsp; tag.. . . . . . . . . . . . 329</p> <p>&nbsp;&nbsp;&nbsp; gitignore.. . . . . . . . . . . 330</p> <p>&nbsp;</p> <p><strong>CHAPTER 16: </strong><strong>Common Infrastructure as Code Technologies</strong><strong>.. . . . . </strong><strong>333</strong></p> <p>&nbsp;&nbsp;&nbsp; File Formats. . . . . . . . . . . 334</p> <p>&nbsp;&nbsp;&nbsp; Utilities.. . . . . . . . . . . . 335</p> <p>&nbsp;&nbsp;&nbsp; Continuous Integration/Continuous Deployment (CI/CD).. . . 338</p> <p>&nbsp;&nbsp;&nbsp; Advanced Git Topics.. . . . . . . . . 339</p> <p>&nbsp;</p> <p><strong>CHAPTER 17: </strong><strong>Container, Cloud, and Orchestration Concepts</strong><strong>.. . . . . </strong><strong>343</strong></p> <p>&nbsp;&nbsp;&nbsp; Kubernetes Benefits and Application Use Cases.. . . . . 344</p> <p>&nbsp;&nbsp;&nbsp; Single-Node, Multicontainer Use Cases. . . . . . 346</p> <p>&nbsp;&nbsp;&nbsp; Container Persistent Storage.. . . . . . . . 346</p> <p>&nbsp;&nbsp;&nbsp; Container Networks.. . . . . . . . . 347</p> <p>&nbsp;&nbsp;&nbsp; Service Mesh.. . . . . . . . . . . 349</p> <p>&nbsp;&nbsp;&nbsp; Bootstrapping. . . . . . . . . . . 350</p> <p>&nbsp;&nbsp;&nbsp; Container Registries.. . . . . . . . . 350</p> <p>&nbsp;</p> <p><strong>Part IV: Troubleshooting</strong></p> <p><strong>CHAPTER 18: </strong><strong>Analyze and Troubleshoot Storage Issues</strong><strong>.. . . . . . </strong><strong>353</strong></p> <p>&nbsp;&nbsp;&nbsp; High Latency.. . . . . . . . . . . 353</p> <p>&nbsp;&nbsp;&nbsp; Input/Output Operations per Second (IOPS) Scenarios.. . . 354</p> <p>&nbsp;&nbsp;&nbsp; Capacity Issues.. . . . . . . . . . 355</p> <p>&nbsp;&nbsp;&nbsp; Filesystem Issues. . . . . . . . . . 358</p> <p>&nbsp;&nbsp;&nbsp; I/O Scheduler. . . . . . . . . . . 359</p> <p>&nbsp;&nbsp;&nbsp; Device Issues.. . . . . . . . . . . 360</p> <p>&nbsp;&nbsp;&nbsp; Mount Option Problems.. . . . . . . . . 363</p> <p>&nbsp;</p> <p><strong>CHAPTER 19: </strong><strong>Analyze and Troubleshoot Network Resource Issues</strong><strong>.. . . . </strong><strong>365</strong></p> <p>&nbsp;&nbsp;&nbsp; Network Configuration Issues.. . . . . . . . 365</p> <p>&nbsp;&nbsp;&nbsp; Firewall Issues.. . . . . . . . . . 367</p> <p>&nbsp;&nbsp;&nbsp; Interface Errors.. . . . . . . . . . 367</p> <p>&nbsp;&nbsp;&nbsp; Bandwidth Limitations. . . . . . . . . 373</p> <p>&nbsp;&nbsp;&nbsp; Name Resolution Issues. . . . . . . . . 374</p> <p>&nbsp;&nbsp;&nbsp; Testing Remote Systems.. . . . . . . . . 375</p> <p>&nbsp;</p> <p><strong>CHAPTER 20: </strong><strong>Analyze and Troubleshoot Central Processing Unit (CPU) and Memory Issues</strong><strong>. . . . </strong><strong>379</strong></p> <p>&nbsp;&nbsp;&nbsp; Runaway Processes.. . . . . . . . . . 379</p> <p>&nbsp;&nbsp;&nbsp; Zombie Processes.. . . . . . . . . . 380</p> <p>&nbsp;&nbsp;&nbsp; High Load Average.. . . . . . . . . . 383</p> <p>&nbsp;&nbsp;&nbsp; High Run Queues.. . . . . . . . . . 384</p> <p>&nbsp;&nbsp;&nbsp; CPU Times.. . . . . . . . . . . 384</p> <p>&nbsp;&nbsp;&nbsp; CPU Process Priorities.. . . . . . . . . 384</p> <p>&nbsp;&nbsp;&nbsp; Memory Exhaustion.. . . . . . . . . 385</p> <p>&nbsp;&nbsp;&nbsp; Out of Memory (OOM). . . . . . . . . 385</p> <p>&nbsp;&nbsp;&nbsp; Swapping.. . . . . . . . . . . 386</p> <p>&nbsp;&nbsp;&nbsp; Hardware. . . . . . . . . . . 388</p> <p>&nbsp;</p> <p><strong>CHAPTER 21: </strong><strong>Analyze and Troubleshoot User Access and File Permissions</strong><strong>. . . </strong><strong>397</strong></p> <p>&nbsp;&nbsp;&nbsp; User Login Issues.. . . . . . . . . . 397</p> <p>&nbsp;&nbsp;&nbsp; User File Access Issues. . . . . . . . . 400</p> <p>&nbsp;&nbsp;&nbsp; Password Issues. . . . . . . . . . 404</p> <p>&nbsp;&nbsp;&nbsp; Privilege Elevation.. . . . . . . . . . 405</p> <p>&nbsp;&nbsp;&nbsp; Quota Issues. . . . . . . . . . . 405</p> <p>&nbsp;</p> <p><strong>CHAPTER 22: </strong><strong>Use systemd to Diagnose and Resolve Common Problems with a Linux System</strong><strong>. . . . . </strong><strong>411</strong></p> <p>&nbsp;&nbsp;&nbsp; Unit Files. . . . . . . . . . . 412</p> <p>&nbsp;&nbsp;&nbsp; Common Problems.. . . . . . . . . . 429</p> <p>&nbsp;</p> <p>9780137898558, TOC, 8/11/2022</p>

Net verschenen

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        CompTIA Linux+ XK0-005 Exam Cram