CompTIA Linux+ XK0-005 Exam Cram

CompTIA Linux+ XK0-005 Exam Cram

by William Rothwell
CompTIA Linux+ XK0-005 Exam Cram

CompTIA Linux+ XK0-005 Exam Cram

by William Rothwell

Paperback

$49.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Related collections and offers


Overview

CompTIA® Linux+ XK0-005 Exam Cram is an all-inclusive study guide designed to help you pass the updated version of the CompTIA Linux+ exam. Prepare for test day success with complete coverage of exam objectives and topics, plus hundreds of realistic practice questions. Extensive prep tools include quizzes, Exam Alerts, and our essential last-minute review CramSheet. The powerful Pearson Test Prep practice software provides real-time assessment and feedback with two complete exams.

Covers the critical information needed to score higher on your Linux+ XK0-005 exam!

  • Manage files and directories
  • Configure and manage storage
  • Manage software configurations
  • Implement identity management
  • Implement and configure firewalls
  • Create simple shell scripts to automate common tasks
  • Perform basic container operations
  • Analyze and troubleshoot storage issues and network resource issues

Prepare for your exam with Pearson Test Prep

  • Realistic practice questions and answers
  • Comprehensive reporting and feedback
  • Customized testing in study, practice exam, or flash card modes
  • Complete coverage of Linux+ XK0-005 exam objectives

Product Details

ISBN-13: 9780137898558
Publisher: Pearson Education
Publication date: 11/05/2022
Series: Exam Cram
Pages: 496
Sales rank: 675,426
Product dimensions: 6.00(w) x 9.00(h) x 1.03(d)

About the Author

At the impressionable age of 14, William “Bo” Rothwell crossed paths with a TRS-80 Micro Computer System (affectionately known as a “Trash 80”). Soon after the adults responsible for Bo made the mistake of leaving him alone with the TSR-80, he dismantled it and held his first computer class, showing his friends what made this “computer thing” work.

Since that experience, Bo's passion for understanding how computers work and sharing this knowledge with others has resulted in a rewarding career in IT training. His experience includes Linux, Unix, IT security, DevOps, cloud technologies, and programming languages such as Perl, Python, Tcl, and BASH. He is the founder and lead instructor of One Course Source, an IT training organization.

Table of Contents

Introduction. . . . . . . . . . . . xxiv

Part I: System Management

CHAPTER 1: Linux Fundamentals. . . . . . . . . . . 1

Filesystem Hierarchy Standard (FHS).. . . . . . . 1

Basic Boot Process.. . . . . . . . . . 3

Kernel Panic. . . . . . . . . . . 10

Device Types in /dev.. . . . . . . . . 10

Basic Package Compilation from Source.. . . . . . 13

./configure.. . . . . . . . . . 13

make.. . . . . . . . . . . 15

make install.. . . . . . . . . . 16

Storage Concepts.. . . . . . . . . . 16

Listing Hardware Information.. . . . . . . . 22

CHAPTER 2: Manage Files and Directories.. . . . . . . . . 27

File Editing.. . . . . . . . . . . 27

File Compression, Archiving, and Backup. . . . . . 36

File Metadata.. . . . . . . . . . . 41

Soft and Hard Links.. . . . . . . . . 43

Copying Files Between Systems.. . . . . . . 46

File and Directory Operations.. . . . . . . . 49

CHAPTER 3: Configure and Manage Storage Using the Appropriate Tools.. . . 57

Disk Partitioning.. . . . . . . . . . 57

Mounting Local and Remote Devices.. . . . . . 61

Filesystem Management. . . . . . . . . 66

Monitoring Storage Space and Disk Usage. . . . . . 70

Creating and Modifying Volumes Using Logical Volume Manager (LVM).. . . . . . . . . . 71

Inspecting RAID Implementations.. . . . . . . 75

Storage Area Network (SAN)/Network-Attached Storage (NAS). . 78

Storage Hardware.. . . . . . . . . . 82

CHAPTER 4: Configure and Use the Appropriate Processes and Services.. . . 85

System Services. . . . . . . . . . 85

Scheduling Services. . . . . . . . . . 90

Process Management. . . . . . . . . 97

CHAPTER 5: Use the Appropriate Networking Tools or Configuration Files. . . 113

Interface Management.. . . . . . . . . 113

Name Resolution.. . . . . . . . . . 122

Network Monitoring.. . . . . . . . . 127

Remote Networking Tools.. . . . . . . . 132

CHAPTER 6: Build and Install Software. . . . . . . . . 139

Package Management.. . . . . . . . . 139

Sandboxed Applications.. . . . . . . . . 149

System Updates.. . . . . . . . . . 150

Part II: Security

CHAPTER 7: Manage Software Configurations.. . . . . . . . 155

Updating Configuration Files.. . . . . . . . 155

Configure Kernel Options.. . . . . . . . 158

Configure Common System Services.. . . . . . . 165

Localization.. . . . . . . . . . . 172

CHAPTER 8: Security Best Practices in a Linux Environment.. . . . . 177

Managing Public Key Infrastructure (PKI) Certificates.. . . 177

Certificate Use Cases. . . . . . . . . 181

Authentication.. . . . . . . . . . 181

Linux Hardening.. . . . . . . . . . 188

CHAPTER 9: Implement Identity Management. . . . . . . . 201

Account Creation and Deletion. . . . . . . . 201

.bashrc. . . . . . . . . . . 212

Account Management.. . . . . . . . . 212

CHAPTER 10: Implement and Configure Firewalls.. . . . . . . . 219

Firewall Use Cases.. . . . . . . . . . 219

Common Firewall Technologies.. . . . . . . 221

Key Firewall Features.. . . . . . . . . 223

CHAPTER 11: Configure and Execute Remote Connectivity for System Management.. 227

SSH.. . . . . . . . . . . . 227

Executing Commands as Another User.. . . . . . 235

CHAPTER 12: Apply the Appropriate Access Controls. . . . . . . 241

File Permissions.. . . . . . . . . . 241

Security-Enhanced Linux (SELinux).. . . . . . . 243

AppArmor.. . . . . . . . . . . 247

Command-Line Utilities.. . . . . . . . . 250

Part III: Scripting, Containers, and Automation

CHAPTER 13: Create Simple Shell Scripts to Automate Common Tasks. . . . 265

Shell Script Elements.. . . . . . . . . 265

Common Script Utilities.. . . . . . . . . 286

Environment Variables. . . . . . . . . 298

Relative and Absolute Paths.. . . . . . . . 302

CHAPTER 14: Perform Basic Container Operations. . . . . . . 305

Container Management.. . . . . . . . . 305

Container Image Operations.. . . . . . . . 312

CHAPTER 15: Perform Basic Version Control Using Git.. . . . . . . 317

Introduction to Version Control and Git.. . . . . . 317

clone.. . . . . . . . . . . . 321

push.. . . . . . . . . . . . 323

pull.. . . . . . . . . . . . 324

commit.. . . . . . . . . . . . 324

add.. . . . . . . . . . . . 325

branch/checkout.. . . . . . . . . . 325

tag.. . . . . . . . . . . . 329

gitignore.. . . . . . . . . . . 330

CHAPTER 16: Common Infrastructure as Code Technologies.. . . . . 333

File Formats. . . . . . . . . . . 334

Utilities.. . . . . . . . . . . . 335

Continuous Integration/Continuous Deployment (CI/CD).. . . 338

Advanced Git Topics.. . . . . . . . . 339

CHAPTER 17: Container, Cloud, and Orchestration Concepts.. . . . . 343

Kubernetes Benefits and Application Use Cases.. . . . . 344

Single-Node, Multicontainer Use Cases. . . . . . 346

Container Persistent Storage.. . . . . . . . 346

Container Networks.. . . . . . . . . 347

Service Mesh.. . . . . . . . . . . 349

Bootstrapping. . . . . . . . . . . 350

Container Registries.. . . . . . . . . 350

Part IV: Troubleshooting

CHAPTER 18: Analyze and Troubleshoot Storage Issues.. . . . . . 353

High Latency.. . . . . . . . . . . 353

Input/Output Operations per Second (IOPS) Scenarios.. . . 354

Capacity Issues.. . . . . . . . . . 355

Filesystem Issues. . . . . . . . . . 358

I/O Scheduler. . . . . . . . . . . 359

Device Issues.. . . . . . . . . . . 360

Mount Option Problems.. . . . . . . . . 363

CHAPTER 19: Analyze and Troubleshoot Network Resource Issues.. . . . 365

Network Configuration Issues.. . . . . . . . 365

Firewall Issues.. . . . . . . . . . 367

Interface Errors.. . . . . . . . . . 367

Bandwidth Limitations. . . . . . . . . 373

Name Resolution Issues. . . . . . . . . 374

Testing Remote Systems.. . . . . . . . . 375

CHAPTER 20: Analyze and Troubleshoot Central Processing Unit (CPU) and Memory Issues. . . . 379

Runaway Processes.. . . . . . . . . . 379

Zombie Processes.. . . . . . . . . . 380

High Load Average.. . . . . . . . . . 383

High Run Queues.. . . . . . . . . . 384

CPU Times.. . . . . . . . . . . 384

CPU Process Priorities.. . . . . . . . . 384

Memory Exhaustion.. . . . . . . . . 385

Out of Memory (OOM). . . . . . . . . 385

Swapping.. . . . . . . . . . . 386

Hardware. . . . . . . . . . . 388

CHAPTER 21: Analyze and Troubleshoot User Access and File Permissions. . . 397

User Login Issues.. . . . . . . . . . 397

User File Access Issues. . . . . . . . . 400

Password Issues. . . . . . . . . . 404

Privilege Elevation.. . . . . . . . . . 405

Quota Issues. . . . . . . . . . . 405

CHAPTER 22: Use systemd to Diagnose and Resolve Common Problems with a Linux System. . . . . 411

Unit Files. . . . . . . . . . . 412

Common Problems.. . . . . . . . . . 429

9780137898558, TOC, 8/11/2022

From the B&N Reads Blog

Customer Reviews