[Ebooks PDF] download Comptia linux+ xk0-005 exam cram 1st edition william rothwell full chapters

Page 1


CompTIA

1st Edition William Rothwell

Visit to download the full and correct content document: https://ebookmass.com/product/comptia-linux-xk0-005-exam-cram-1st-edition-williamrothwell/

More products digital (pdf, epub, mobi) instant download maybe you interests ...

CompTIA Linux+ XK0-005 Exam Cram William “Bo” Rothwell

https://ebookmass.com/product/comptia-linux-xk0-005-exam-cramwilliam-bo-rothwell/

CompTIA Linux+ Certification. Exam Guide 2 (Exam XK0-005) Edition Ted Jordan

https://ebookmass.com/product/comptia-linux-certification-examguide-2-exam-xk0-005-edition-ted-jordan/

CompTIA Linux+ Certification All-in-One Exam Guide (Exam XK0-005), 2nd Edition Ted Jordan

https://ebookmass.com/product/comptia-linux-certification-all-inone-exam-guide-exam-xk0-005-2nd-edition-ted-jordan/

CompTIA Network+ N10-008 Exam Cram 7th Edition Emmett

Dulaney

https://ebookmass.com/product/comptia-network-n10-008-examcram-7th-edition-emmett-dulaney/

CompTIA Project+™ Certification All-in-One Exam Guide (Exam PK0-005) 1st Edition Joseph Phillips

https://ebookmass.com/product/comptia-project-certification-allin-one-exam-guide-exam-pk0-005-1st-edition-joseph-phillips/

CompTIA Server+ Certification All-in-One Exam Guide, Second Edition (Exam SK0-005) Lachance

https://ebookmass.com/product/comptia-server-certification-allin-one-exam-guide-second-edition-exam-sk0-005-lachance/

CompTIA Server+ Certification All-in-One Exam Guide (Exam SK0-005), 2nd Edition Daniel Lachance

https://ebookmass.com/product/comptia-server-certification-allin-one-exam-guide-exam-sk0-005-2nd-edition-daniel-lachance/

CompTIA Server+ Certification All-in-One Exam Guide, Second Edition (Exam SK0-005) Daniel Lachance Lachance It Consulting Inc.

https://ebookmass.com/product/comptia-server-certification-allin-one-exam-guide-second-edition-exam-sk0-005-daniel-lachancelachance-it-consulting-inc/

CompTIA Project+ PK0-005 Cert Guide, 2nd Edition Robin Abernathy & Ann Lang

https://ebookmass.com/product/comptia-project-pk0-005-certguide-2nd-edition-robin-abernathy-ann-lang/

About This eBook

ePUB is an open, industry-standard format for eBooks. However, support of ePUB and its many features varies across reading devices and applications. Use your device or app settings to customize the presentation to your liking. Settings that you can customize often include font, font size, single or double column, landscape or portrait mode, and figures that you can click or tap to enlarge. For additional information about the settings and features on your reading device or app, visit the device manufacturer’s Web site. Many titles include programming code or configuration examples. To optimize the presentation of these elements, view the eBook in single-column, landscape mode and adjust the font size to the smallest setting. In addition to presenting code and configurations in the reflowable text format, we have included images of the code that mimic the presentation found in the print book; therefore, where the reflowable format may compromise the presentation of the code listing, you will see a “Click here to view code image” link. Click the link to view the print-fidelity code image. To return to the previous page viewed, click the Back button on your device or app.

EXAM CRAM

CompTIA

William “Bo” Rothwell

CompTIA® Linux+® XK0-005 Exam Cram

Copyright © 2023 by Pearson Education, Inc.

All rights reserved. This publication is protected by copyright, and permission must be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. For information regarding permissions, request forms, and the appropriate contacts within the Pearson Education Global Rights & Permissions Department, please visit www.pearson.com/permissions. No patent liability is assumed with respect to the use of the information contained herein. Although every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions. Nor is any liability assumed for damages resulting from the use of the information contained herein.

ISBN-13: 978-0-13-789855-8

ISBN-10: 0-13-789855-X

Library of Congress Control Number: 2022910969

Trademarks

All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Pearson IT Certification cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark.

Warning and Disclaimer

This book is designed to provide information about the CompTIA® Linux+® (XK0-005) certification. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied.

Special Sales

For information about buying this title in bulk quantities, or for special sales opportunities (which may include electronic versions; custom cover designs; and content particular to your business, training goals, marketing focus, or branding interests), please contact our corporate sales department at corpsales@pearsoned.com or (800) 382-3419.

For government sales inquiries, please contact governmentsales@pearsoned.com.

For questions about sales outside the U.S., please contact intlcs@pearson.com.

Editor-in-Chief

Mark L. Taub

Director, ITP Product Management

Brett Bartow

Executive Editor

Nancy Davis

Development Editor

Christopher A. Cleveland

Managing Editor

Sandra Schroeder

Project Editor

Mandie Frank

Copy Editor

Kitty Wilson

Indexer

Erika Millen

Proofreader

Donna E. Mulder

Technical Editor

Casey Boyles

Publishing Coordinator

Cindy Teeters

Designer

Chuti Prasertsith

Compositor

codeMantra

Pearson’s Commitment to Diversity, Equity, and Inclusion

Pearson is dedicated to creating bias-free content that reflects the diversity of all learners. We embrace the many dimensions of diversity, including but not limited to race, ethnicity, gender, socioeconomic status, ability, age, sexual orientation, and religious or political beliefs.

Education is a powerful force for equity and change in our world. It has the potential to deliver opportunities that improve lives and enable economic mobility. As we work with authors to create content for every product and service, we acknowledge our responsibility to demonstrate inclusivity and incorporate diverse scholarship so that everyone can achieve their potential through learning. As the world’s leading learning company, we have a duty to help drive change and live up to our purpose to help more people create a better life for themselves and to create a better world.

Our ambition is to purposefully contribute to a world where

Everyone has an equitable and lifelong opportunity to succeed through learning

Our educational products and services are inclusive and represent the rich diversity of learners

Our educational content accurately reflects the histories and experiences of the learners we serve

Our educational content prompts deeper discussions with learners and motivates them to expand their own learning (and worldview)

While we work hard to present unbiased content, we want to hear from you about any concerns or needs with this Pearson product so that we can investigate and address them.

Please contact us with concerns about any potential bias at https://www.pearson.com/report-bias.xhtml.

Contents at a Glance

Part I: System Management

CHAPTER 1: Linux Fundamentals

CHAPTER 2: Manage Files and Directories

CHAPTER 3: Configure and Manage Storage Using the Appropriate Tools

CHAPTER 4: Configure and Use the Appropriate Processes and Services

CHAPTER 5: Use the Appropriate Networking Tools or Configuration Files

CHAPTER 6: Build and Install Software

Part II: Security

CHAPTER 7: Manage Software Configurations

CHAPTER 8: Security Best Practices in a Linux Environment

CHAPTER 9: Implement Identity Management

CHAPTER 10: Implement and Configure Firewalls

CHAPTER 11: Configure and Execute Remote Connectivity for System Management

CHAPTER 12: Apply the Appropriate Access Controls

Part III: Scripting, Containers, and Automation

CHAPTER 13: Create Simple Shell Scripts to Automate Common Tasks

CHAPTER 14: Perform Basic Container Operations

CHAPTER 15: Perform Basic Version Control Using Git

CHAPTER 16: Common Infrastructure as Code Technologies

CHAPTER 17: Container, Cloud, and Orchestration Concepts

Part IV: Troubleshooting

CHAPTER 18: Analyze and Troubleshoot Storage Issues

CHAPTER 19: Analyze and Troubleshoot Network Resource Issues

CHAPTER 20: Analyze and Troubleshoot Central Processing Unit (CPU) and Memory Issues

CHAPTER 21: Analyze and Troubleshoot User Access and File Permissions

CHAPTER 22: Use systemd to Diagnose and Resolve Common Problems with a Linux System Index

Table of Contents

Introduction

Part I: System Management

CHAPTER 1:

Linux Fundamentals

Filesystem Hierarchy Standard (FHS)

Basic Boot Process

Basic Input/Output System (BIOS)/Unified Extensible Firmware Interface (UEFI)

Commands

initrd.img vmlinuz

Grand Unified Bootloader Version 2 (GRUB2)

Boot Sources

Kernel Panic

Device Types in /dev

Block Devices

Character Devices

Special Character Devices

Basic Package Compilation from Source ./configure make make install

Storage Concepts

File Storage

Block Storage

Object Storage

Partition Type

Filesystem in Userspace (FUSE)

Redundant Array of Independent (or Inexpensive) Disks (RAID) Levels

Listing Hardware Information lspci lsusb dmidecode

CHAPTER 2: Manage Files and Directories

File Editing sed awk printf nano vi

File Compression, Archiving, and Backup

File Metadata

stat

file

Soft and Hard Links

Symbolic (Soft) Links

Hard Links

Copying Files Between Systems

rsync

File and Directory Operations mv cp mkdir

cd

. (Current Directory)

.. (Level Above the Current Directory)

~ (User’s Home Directory)

tree cat touch

CHAPTER 3:

Configure and Manage Storage Using the Appropriate Tools

Disk Partitioning

fdisk

partprobe

Mounting Local and Remote Devices

systemd.mount

/etc/fstab

mount

Linux Unified Key Setup (LUKS)

Filesystem Management

XFS Tools

ext4 Tools

Btrfs Tools

Monitoring Storage Space and Disk Usage

df du

Creating and Modifying Volumes Using Logical Volume Manager (LVM)

pvs

vgs

lvs

lvchange

lvcreate

vgcreate

lvresize

pvcreate

vgextend

Inspecting RAID Implementations

mdadm /proc/mdstat

Storage Area Network (SAN)/Network-Attached Storage (NAS)

multipathd

Network Filesystems

Storage Hardware

lsscsi

lsblk

blkid

fcstat

CHAPTER 4:

Configure and Use the Appropriate Processes and Services

System Services systemctl stop start restart status enable disable mask

Scheduling Services

cron

crontab at Process Management Kill Signals

Listing Processes and Open Files

Setting Priorities

Process States

Job Control

pgrep

pkill

pidof

CHAPTER 5:

Use the Appropriate Networking Tools or Configuration Files

Interface Management

iproute2 Tools

NetworkManager

net-tools

/etc/sysconfig/network-scripts/

Name Resolution

nsswitch

/etc/resolv.conf

systemd

Bind-utils

WHOIS

Network Monitoring

tcpdump

Wireshark/tshark

netstat

traceroute

ping mtr

Remote Networking Tools

Secure Shell (SSH)

cURL

wget

nc

rsync

Secure Copy Protocol (SCP)

SSH File Transfer Protocol (SFTP)

CHAPTER 6:

Build and Install Software

Package Management DNF

ZYpp

Sandboxed Applications

snapd

Flatpak

AppImage

System Updates

Kernel Updates

Package Updates

Part II: Security

CHAPTER 7:Manage Software Configurations

Updating Configuration Files

Procedures .rpmnew

.rpmsave

Repository Configuration Files

Configure Kernel Options

Parameters

Modules

Configure Common System Services

SSH

Network Time Protocol (NTP)

Syslog

chrony

Localization

timedatectl

localectl

CHAPTER 8:

Security Best Practices in a Linux Environment

Managing Public Key Infrastructure (PKI) Certificates

Public Key

Private Key

Self-Signed Certificate

Digital Signature

Wildcard Certificate

Hashing

Certificate Authorities

Certificate Use Cases

Secure Sockets Layer (SSL)/Transport Layer Security (TLS)

Certificate Authentication

Encryption

Authentication

Tokens

Multifactor Authentication (MFA)

Pluggable Authentication Modules (PAM)

System Security Services Daemon (SSSD)

Lightweight Directory Access Protocol (LDAP)

Single Sign-on (SSO)

Linux Hardening

Security Scanning

Secure Boot (UEFI)

System Logging Configurations

Setting Default umask

Disabling/Removing Insecure Services

Enforcing Password Strength

Removing Unused Packages

Tuning Kernel Parameters

Securing Service Accounts

Configuring the Host Firewall

CHAPTER 9:

Implement Identity Management

Account Creation and Deletion

Default Shell

/etc/passwd /etc/group /etc/shadow /etc/profile /etc/skel

.bash_profile .bashrc

Account Management passwd chage pam_tally2

faillock

/etc/login.defs

CHAPTER 10:

Implement and Configure Firewalls

Firewall Use Cases

Open and Close Ports

Check Current Configuration

Enable/Disable Internet Protocol (IP) Forwarding

Common Firewall Technologies

firewalld iptables nftables

Uncomplicated Firewall (UFW)

Key Firewall Features

Zones

Services

Stateful/Stateless

CHAPTER 11:

Configure and Execute Remote Connectivity for System Management

SSH

~/.ssh/known_hosts

~/.ssh/authorized_keys

/etc/ssh/sshd_config

/etc/ssh/ssh_config

~/.ssh/config

ssh-keygen

ssh-copy-id

ssh-add

Tunneling

Executing Commands as Another User

/etc/sudoers

PolicyKit Rules

sudo visudo

supkexec

CHAPTER 12:

Apply the Appropriate Access Controls

File Permissions

Access Control List (ACL)

Set User ID (SUID), Set Group ID (SGID), and Sticky Bit

Security-Enhanced Linux (SELinux)

Context Permissions

Labels

Autorelabel System Booleans States Policy Types

AppArmor

Command-Line Utilities

chmod umask chown

setfacl/getfacl ls setenforce getenforce chattr/lsattr chgrp setsebool getsebool chcon restorecon semanage audit2allow

Part III: Scripting, Containers, and Automation

CHAPTER 13:

Create Simple Shell Scripts to Automate Common Tasks

Shell Script Elements

Loops while for until Conditionals if switch/case

Shell Parameter Expansion

Comparisons

Variables

Search and Replace

Regular Expressions

Standard Stream Redirection && Here Documents Exit Codes

Shell Built-in Commands

Common Script Utilities awk Sed find xargs grep egrep tee wc cut tr head

tail

Environment Variables

$PATH

$SHELL

$?

Relative and Absolute Paths

CHAPTER 14:

Perform Basic Container Operations

Container Management

Starting/Stopping

Inspecting

Listing

Deploying Existing Images

Connecting to Containers

Logging

Exposing Ports

Container Image Operations build push pull list rmi

CHAPTER 15:

Perform Basic Version Control Using Git

Introduction to Version Control and Git

The Third Generation clone push

pull

commit

add

branch/checkout

tag gitignore

CHAPTER 16:

Common Infrastructure as Code Technologies

File Formats

JavaScript Object Notation (JSON)

YAML Ain’t Markup Language (YAML)

Utilities

Ansible

Puppet

Chef

SaltStack

Terraform

Continuous Integration/Continuous Deployment (CI/CD)

Advanced Git Topics

merge rebase

Pull Requests

CHAPTER 17:

Container, Cloud, and Orchestration Concepts

Kubernetes Benefits and Application Use Cases

Pods

Sidecars

Ambassador Containers

Single-Node, Multicontainer Use Cases

Compose

Container Persistent Storage

Container Networks

Overlay Networks

Bridging

Network Address Translation (NAT)

Host Service Mesh

Bootstrapping

Cloud-init

Container Registries

Part IV: Troubleshooting

CHAPTER 18:

Analyze and Troubleshoot Storage Issues

High Latency

Input/Output (I/O) Wait

Input/Output Operations per Second (IOPS) Scenarios

Low IOPS

Capacity Issues

Low Disk Space

Inode Exhaustion

Filesystem Issues

Corruption

Mismatch

I/O Scheduler

Device Issues

Non-volatile Memory Express (NVMe)

Solid-State Drive (SSD)

SSD Trim

RAID

LVM

I/O Errors

Mount Option Problems

CHAPTER 19:

Analyze and Troubleshoot Network Resource Issues

Network Configuration Issues

Subnet Routing

Firewall Issues

Interface Errors

Dropped Packets

Collisions

Link Status

Bandwidth Limitations

High Latency

Name Resolution Issues

Domain Name System (DNS)

Testing Remote Systems

nmap openssl s_client

CHAPTER 20:

Analyze and Troubleshoot Central Processing Unit (CPU) and Memory Issues

Runaway Processes

Zombie Processes

High CPU Utilization

High Load Average

High Run Queues

CPU Times

CPU Process Priorities

nice renice

Memory Exhaustion

Free Memory vs. File Cache

Out of Memory (OOM)

Memory Leaks

Process Killer

Swapping

Hardware

lscpu

lsmem

/proc/cpuinfo

/proc/meminfo

CHAPTER 21:

Analyze and Troubleshoot User Access and File Permissions

User Login Issues

Local

User File Access Issues

Group Context Permission

ACL

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
[Ebooks PDF] download Comptia linux+ xk0-005 exam cram 1st edition william rothwell full chapters by Education Libraries - Issuu