Pearson Practice Test (eBook, ePUB)
Alle Infos zum eBook verschenken
Pearson Practice Test (eBook, ePUB)
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Hier können Sie sich einloggen
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Prepare for CompTIA Linux+ XK0-005 exam success with this Exam Cram from Pearson IT Certification, a leader in IT certification.
This is the eBook edition of the CompTIA Linux+ XK0-005 Exam Cram. This eBook does not include access to the Pearson Test Prep practice exams that comes with the print edition.
CompTIA Linux+ XK0-005 Exam Cram is an all-inclusive study guide designed to help you pass the updated version of the CompTIA Linux+ exam. Prepare for test day success with complete coverage of exam objectives and topics, plus hundreds of realistic practice questions. Extensive prep…mehr
- Geräte: eReader
- ohne Kopierschutz
- eBook Hilfe
- Größe: 23.4MB
- John DavisVCP6-DCV Official Cert Guide (Exam #2V0-621) (eBook, ePUB)31,95 €
- Streif Rudolf J.Embedded Linux Systems with the Yocto Project (eBook, ePUB)16,95 €
- Stephen KochanShell Programming in Unix, Linux and OS X (eBook, ePUB)20,95 €
- Ed WilsonWindows PowerShell Step by Step (eBook, ePUB)16,95 €
- Jonathan MoellerThe Linux Command Line Beginner's Guide (Computer Beginner's Guide, #3) (eBook, ePUB)1,69 €
- Steve ParkerShell Scripting (eBook, ePUB)33,99 €
- William RothwellLinux Essentials for Cybersecurity (eBook, PDF)41,95 €
-
-
-
This is the eBook edition of the CompTIA Linux+ XK0-005 Exam Cram. This eBook does not include access to the Pearson Test Prep practice exams that comes with the print edition.
CompTIA Linux+ XK0-005 Exam Cram is an all-inclusive study guide designed to help you pass the updated version of the CompTIA Linux+ exam. Prepare for test day success with complete coverage of exam objectives and topics, plus hundreds of realistic practice questions. Extensive prep tools include quizzes, Exam Alerts, and our essential last-minute review Cram Sheet.
Covers the critical information needed to score higher on your Linux+ XK0-005 exam!
- Manage files and directories
- Configure and manage storage
- Manage software configurations
- Implement identity management
- Implement and configure firewalls
- Create simple shell scripts to automate common tasks
- Perform basic container operations
- Analyze and troubleshoot storage issues and network resource issues
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Produktdetails
- Verlag: Pearson ITP
- Seitenzahl: 496
- Altersempfehlung: ab 18 Jahre
- Erscheinungstermin: 20. September 2022
- Englisch
- ISBN-13: 9780137898497
- Artikelnr.: 66389753
- Verlag: Pearson ITP
- Seitenzahl: 496
- Altersempfehlung: ab 18 Jahre
- Erscheinungstermin: 20. September 2022
- Englisch
- ISBN-13: 9780137898497
- Artikelnr.: 66389753
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Since that experience, Bo's passion for understanding how computers work and sharing this knowledge with others has resulted in a rewarding career in IT training. His experience includes Linux, Unix, IT security, DevOps, cloud technologies, and programming languages such as Perl, Python, Tcl, and BASH. He is the founder and lead instructor of One Course Source, an IT training organization.
Part I: System Management
CHAPTER 1: Linux Fundamentals. . . . . . . . . . . 1
Filesystem Hierarchy Standard (FHS).. . . . . . . 1
Basic Boot Process.. . . . . . . . . . 3
Kernel Panic. . . . . . . . . . . 10
Device Types in /dev.. . . . . . . . . 10
Basic Package Compilation from Source.. . . . . . 13
./configure.. . . . . . . . . . 13
make.. . . . . . . . . . . 15
make install.. . . . . . . . . . 16
Storage Concepts.. . . . . . . . . . 16
Listing Hardware Information.. . . . . . . . 22
CHAPTER 2: Manage Files and Directories.. . . . . . . . . 27
File Editing.. . . . . . . . . . . 27
File Compression, Archiving, and Backup. . . . . . 36
File Metadata.. . . . . . . . . . . 41
Soft and Hard Links.. . . . . . . . . 43
Copying Files Between Systems.. . . . . . . 46
File and Directory Operations.. . . . . . . . 49
CHAPTER 3: Configure and Manage Storage Using the Appropriate Tools.. . .
57
Disk Partitioning.. . . . . . . . . . 57
Mounting Local and Remote Devices.. . . . . . 61
Filesystem Management. . . . . . . . . 66
Monitoring Storage Space and Disk Usage. . . . . . 70
Creating and Modifying Volumes Using Logical Volume Manager (LVM).. . .
. . . . . . . 71
Inspecting RAID Implementations.. . . . . . . 75
Storage Area Network (SAN)/Network-Attached Storage (NAS). . 78
Storage Hardware.. . . . . . . . . . 82
CHAPTER 4: Configure and Use the Appropriate Processes and Services.. . .
85
System Services. . . . . . . . . . 85
Scheduling Services. . . . . . . . . . 90
Process Management. . . . . . . . . 97
CHAPTER 5: Use the Appropriate Networking Tools or Configuration Files. . .
113
Interface Management.. . . . . . . . . 113
Name Resolution.. . . . . . . . . . 122
Network Monitoring.. . . . . . . . . 127
Remote Networking Tools.. . . . . . . . 132
CHAPTER 6: Build and Install Software. . . . . . . . . 139
Package Management.. . . . . . . . . 139
Sandboxed Applications.. . . . . . . . . 149
System Updates.. . . . . . . . . . 150
Part II: Security
CHAPTER 7: Manage Software Configurations.. . . . . . . . 155
Updating Configuration Files.. . . . . . . . 155
Configure Kernel Options.. . . . . . . . 158
Configure Common System Services.. . . . . . . 165
Localization.. . . . . . . . . . . 172
CHAPTER 8: Security Best Practices in a Linux Environment.. . . . . 177
Managing Public Key Infrastructure (PKI) Certificates.. . . 177
Certificate Use Cases. . . . . . . . . 181
Authentication.. . . . . . . . . . 181
Linux Hardening.. . . . . . . . . . 188
CHAPTER 9: Implement Identity Management. . . . . . . . 201
Account Creation and Deletion. . . . . . . . 201
.bashrc. . . . . . . . . . . 212
Account Management.. . . . . . . . . 212
CHAPTER 10: Implement and Configure Firewalls.. . . . . . . . 219
Firewall Use Cases.. . . . . . . . . . 219
Common Firewall Technologies.. . . . . . . 221
Key Firewall Features.. . . . . . . . . 223
CHAPTER 11: Configure and Execute Remote Connectivity for System Management
.. 227
SSH.. . . . . . . . . . . . 227
Executing Commands as Another User.. . . . . . 235
CHAPTER 12: Apply the Appropriate Access Controls. . . . . . . 241
File Permissions.. . . . . . . . . . 241
Security-Enhanced Linux (SELinux).. . . . . . . 243
AppArmor.. . . . . . . . . . . 247
Command-Line Utilities.. . . . . . . . . 250
Part III: Scripting, Containers, and Automation
CHAPTER 13: Create Simple Shell Scripts to Automate Common Tasks. . . .
265
Shell Script Elements.. . . . . . . . . 265
Common Script Utilities.. . . . . . . . . 286
Environment Variables. . . . . . . . . 298
Relative and Absolute Paths.. . . . . . . . 302
CHAPTER 14: Perform Basic Container Operations. . . . . . . 305
Container Management.. . . . . . . . . 305
Container Image Operations.. . . . . . . . 312
CHAPTER 15: Perform Basic Version Control Using Git.. . . . . . . 317
Introduction to Version Control and Git.. . . . . . 317
clone.. . . . . . . . . . . . 321
push.. . . . . . . . . . . . 323
pull.. . . . . . . . . . . . 324
commit.. . . . . . . . . . . . 324
add.. . . . . . . . . . . . 325
branch/checkout.. . . . . . . . . . 325
tag.. . . . . . . . . . . . 329
gitignore.. . . . . . . . . . . 330
CHAPTER 16: Common Infrastructure as Code Technologies.. . . . . 333
File Formats. . . . . . . . . . . 334
Utilities.. . . . . . . . . . . . 335
Continuous Integration/Continuous Deployment (CI/CD).. . . 338
Advanced Git Topics.. . . . . . . . . 339
CHAPTER 17: Container, Cloud, and Orchestration Concepts.. . . . . 343
Kubernetes Benefits and Application Use Cases.. . . . . 344
Single-Node, Multicontainer Use Cases. . . . . . 346
Container Persistent Storage.. . . . . . . . 346
Container Networks.. . . . . . . . . 347
Service Mesh.. . . . . . . . . . . 349
Bootstrapping. . . . . . . . . . . 350
Container Registries.. . . . . . . . . 350
Part IV: Troubleshooting
CHAPTER 18: Analyze and Troubleshoot Storage Issues.. . . . . . 353
High Latency.. . . . . . . . . . . 353
Input/Output Operations per Second (IOPS) Scenarios.. . . 354
Capacity Issues.. . . . . . . . . . 355
Filesystem Issues. . . . . . . . . . 358
I/O Scheduler. . . . . . . . . . . 359
Device Issues.. . . . . . . . . . . 360
Mount Option Problems.. . . . . . . . . 363
CHAPTER 19: Analyze and Troubleshoot Network Resource Issues.. . . . 365
Network Configuration Issues.. . . . . . . . 365
Firewall Issues.. . . . . . . . . . 367
Interface Errors.. . . . . . . . . . 367
Bandwidth Limitations. . . . . . . . . 373
Name Resolution Issues. . . . . . . . . 374
Testing Remote Systems.. . . . . . . . . 375
CHAPTER 20: Analyze and Troubleshoot Central Processing Unit (CPU) and
Memory Issues. . . . 379
Runaway Processes.. . . . . . . . . . 379
Zombie Processes.. . . . . . . . . . 380
High Load Average.. . . . . . . . . . 383
High Run Queues.. . . . . . . . . . 384
CPU Times.. . . . . . . . . . . 384
CPU Process Priorities.. . . . . . . . . 384
Memory Exhaustion.. . . . . . . . . 385
Out of Memory (OOM). . . . . . . . . 385
Swapping.. . . . . . . . . . . 386
Hardware. . . . . . . . . . . 388
CHAPTER 21: Analyze and Troubleshoot User Access and File Permissions. . .
397
User Login Issues.. . . . . . . . . . 397
User File Access Issues. . . . . . . . . 400
Password Issues. . . . . . . . . . 404
Privilege Elevation.. . . . . . . . . . 405
Quota Issues. . . . . . . . . . . 405
CHAPTER 22: Use systemd to Diagnose and Resolve Common Problems with a
Linux System. . . . . 411
Unit Files. . . . . . . . . . . 412
Common Problems.. . . . . . . . . . 429
9780137898558, TOC, 8/11/2022
Part I: System Management
CHAPTER 1: Linux Fundamentals. . . . . . . . . . . 1
Filesystem Hierarchy Standard (FHS).. . . . . . . 1
Basic Boot Process.. . . . . . . . . . 3
Kernel Panic. . . . . . . . . . . 10
Device Types in /dev.. . . . . . . . . 10
Basic Package Compilation from Source.. . . . . . 13
./configure.. . . . . . . . . . 13
make.. . . . . . . . . . . 15
make install.. . . . . . . . . . 16
Storage Concepts.. . . . . . . . . . 16
Listing Hardware Information.. . . . . . . . 22
CHAPTER 2: Manage Files and Directories.. . . . . . . . . 27
File Editing.. . . . . . . . . . . 27
File Compression, Archiving, and Backup. . . . . . 36
File Metadata.. . . . . . . . . . . 41
Soft and Hard Links.. . . . . . . . . 43
Copying Files Between Systems.. . . . . . . 46
File and Directory Operations.. . . . . . . . 49
CHAPTER 3: Configure and Manage Storage Using the Appropriate Tools.. . .
57
Disk Partitioning.. . . . . . . . . . 57
Mounting Local and Remote Devices.. . . . . . 61
Filesystem Management. . . . . . . . . 66
Monitoring Storage Space and Disk Usage. . . . . . 70
Creating and Modifying Volumes Using Logical Volume Manager (LVM).. . .
. . . . . . . 71
Inspecting RAID Implementations.. . . . . . . 75
Storage Area Network (SAN)/Network-Attached Storage (NAS). . 78
Storage Hardware.. . . . . . . . . . 82
CHAPTER 4: Configure and Use the Appropriate Processes and Services.. . .
85
System Services. . . . . . . . . . 85
Scheduling Services. . . . . . . . . . 90
Process Management. . . . . . . . . 97
CHAPTER 5: Use the Appropriate Networking Tools or Configuration Files. . .
113
Interface Management.. . . . . . . . . 113
Name Resolution.. . . . . . . . . . 122
Network Monitoring.. . . . . . . . . 127
Remote Networking Tools.. . . . . . . . 132
CHAPTER 6: Build and Install Software. . . . . . . . . 139
Package Management.. . . . . . . . . 139
Sandboxed Applications.. . . . . . . . . 149
System Updates.. . . . . . . . . . 150
Part II: Security
CHAPTER 7: Manage Software Configurations.. . . . . . . . 155
Updating Configuration Files.. . . . . . . . 155
Configure Kernel Options.. . . . . . . . 158
Configure Common System Services.. . . . . . . 165
Localization.. . . . . . . . . . . 172
CHAPTER 8: Security Best Practices in a Linux Environment.. . . . . 177
Managing Public Key Infrastructure (PKI) Certificates.. . . 177
Certificate Use Cases. . . . . . . . . 181
Authentication.. . . . . . . . . . 181
Linux Hardening.. . . . . . . . . . 188
CHAPTER 9: Implement Identity Management. . . . . . . . 201
Account Creation and Deletion. . . . . . . . 201
.bashrc. . . . . . . . . . . 212
Account Management.. . . . . . . . . 212
CHAPTER 10: Implement and Configure Firewalls.. . . . . . . . 219
Firewall Use Cases.. . . . . . . . . . 219
Common Firewall Technologies.. . . . . . . 221
Key Firewall Features.. . . . . . . . . 223
CHAPTER 11: Configure and Execute Remote Connectivity for System Management
.. 227
SSH.. . . . . . . . . . . . 227
Executing Commands as Another User.. . . . . . 235
CHAPTER 12: Apply the Appropriate Access Controls. . . . . . . 241
File Permissions.. . . . . . . . . . 241
Security-Enhanced Linux (SELinux).. . . . . . . 243
AppArmor.. . . . . . . . . . . 247
Command-Line Utilities.. . . . . . . . . 250
Part III: Scripting, Containers, and Automation
CHAPTER 13: Create Simple Shell Scripts to Automate Common Tasks. . . .
265
Shell Script Elements.. . . . . . . . . 265
Common Script Utilities.. . . . . . . . . 286
Environment Variables. . . . . . . . . 298
Relative and Absolute Paths.. . . . . . . . 302
CHAPTER 14: Perform Basic Container Operations. . . . . . . 305
Container Management.. . . . . . . . . 305
Container Image Operations.. . . . . . . . 312
CHAPTER 15: Perform Basic Version Control Using Git.. . . . . . . 317
Introduction to Version Control and Git.. . . . . . 317
clone.. . . . . . . . . . . . 321
push.. . . . . . . . . . . . 323
pull.. . . . . . . . . . . . 324
commit.. . . . . . . . . . . . 324
add.. . . . . . . . . . . . 325
branch/checkout.. . . . . . . . . . 325
tag.. . . . . . . . . . . . 329
gitignore.. . . . . . . . . . . 330
CHAPTER 16: Common Infrastructure as Code Technologies.. . . . . 333
File Formats. . . . . . . . . . . 334
Utilities.. . . . . . . . . . . . 335
Continuous Integration/Continuous Deployment (CI/CD).. . . 338
Advanced Git Topics.. . . . . . . . . 339
CHAPTER 17: Container, Cloud, and Orchestration Concepts.. . . . . 343
Kubernetes Benefits and Application Use Cases.. . . . . 344
Single-Node, Multicontainer Use Cases. . . . . . 346
Container Persistent Storage.. . . . . . . . 346
Container Networks.. . . . . . . . . 347
Service Mesh.. . . . . . . . . . . 349
Bootstrapping. . . . . . . . . . . 350
Container Registries.. . . . . . . . . 350
Part IV: Troubleshooting
CHAPTER 18: Analyze and Troubleshoot Storage Issues.. . . . . . 353
High Latency.. . . . . . . . . . . 353
Input/Output Operations per Second (IOPS) Scenarios.. . . 354
Capacity Issues.. . . . . . . . . . 355
Filesystem Issues. . . . . . . . . . 358
I/O Scheduler. . . . . . . . . . . 359
Device Issues.. . . . . . . . . . . 360
Mount Option Problems.. . . . . . . . . 363
CHAPTER 19: Analyze and Troubleshoot Network Resource Issues.. . . . 365
Network Configuration Issues.. . . . . . . . 365
Firewall Issues.. . . . . . . . . . 367
Interface Errors.. . . . . . . . . . 367
Bandwidth Limitations. . . . . . . . . 373
Name Resolution Issues. . . . . . . . . 374
Testing Remote Systems.. . . . . . . . . 375
CHAPTER 20: Analyze and Troubleshoot Central Processing Unit (CPU) and
Memory Issues. . . . 379
Runaway Processes.. . . . . . . . . . 379
Zombie Processes.. . . . . . . . . . 380
High Load Average.. . . . . . . . . . 383
High Run Queues.. . . . . . . . . . 384
CPU Times.. . . . . . . . . . . 384
CPU Process Priorities.. . . . . . . . . 384
Memory Exhaustion.. . . . . . . . . 385
Out of Memory (OOM). . . . . . . . . 385
Swapping.. . . . . . . . . . . 386
Hardware. . . . . . . . . . . 388
CHAPTER 21: Analyze and Troubleshoot User Access and File Permissions. . .
397
User Login Issues.. . . . . . . . . . 397
User File Access Issues. . . . . . . . . 400
Password Issues. . . . . . . . . . 404
Privilege Elevation.. . . . . . . . . . 405
Quota Issues. . . . . . . . . . . 405
CHAPTER 22: Use systemd to Diagnose and Resolve Common Problems with a
Linux System. . . . . 411
Unit Files. . . . . . . . . . . 412
Common Problems.. . . . . . . . . . 429
9780137898558, TOC, 8/11/2022