CompTIA Linux+ Study Guide : Exam XK0-004.

By: Bresnahan, ChristineContributor(s): Blum, RichardMaterial type: TextTextSeries: eBooks on DemandPublisher: Newark : John Wiley & Sons, Incorporated, 2019Copyright date: ©2019Edition: 4th edDescription: 1 online resource (931 pages)Content type: text Media type: computer Carrier type: online resourceISBN: 9781119556053Subject(s): Electronic data processing personnel-CertificationGenre/Form: Electronic books.Additional physical formats: Print version:: CompTIA Linux+ Study Guide : Exam XK0-004DDC classification: 005.44769 LOC classification: QA76.3 .B747 2019Online resources: Click here to view this ebook.
Contents:
Cover -- Title Page -- Acknowledgments -- About the Authors -- Contents at a Glance -- Contents -- Introduction -- Assessment Test -- Part I Gathering Your Tools -- Chapter 1 Preparing Your Environment -- Setting Up a Learning Space -- Using That Old Laptop -- Creating a Virtualized Environment -- Jumping to the Cloud -- Exploring Linux Distributions -- Looking at CentOS -- Looking at Ubuntu -- Looking at openSUSE -- Looking at Fedora -- Locating a Terminal -- Summary -- Chapter 2 Sifting Through Services -- What Is a Linux Server? -- Launching Services -- Listening for Clients -- Serving the Basics -- Web Servers -- Database Servers -- Mail Servers -- Serving Local Networks -- File Servers -- Print Servers -- Network Resource Servers -- Implementing Security -- Authentication Server -- Certificate Authority -- Access Server (SSH) -- Virtual Private Networks -- Proxy Server -- Monitoring -- Improving Performance -- Clustering -- Load Balancing -- Containers -- Summary -- Exam Essentials -- Review Questions -- Chapter 3 Managing Files, Directories, and Text -- Handling Files and Directories -- Viewing and Creating Files -- Copying and Moving Files -- Removing Files -- Linking Files and Directories -- Establishing a Hard Link -- Constructing a Soft Link -- Reading Files -- Reading Entire Text Files -- Reading Text File Portions -- Reading Text File Pages -- Finding Information -- Exploring File Differences -- Using Simple Pinpoint Commands -- Using Intricate Pinpoint Commands -- Summary -- Exam Essentials -- Review Questions -- Chapter 4 Searching and Analyzing Text -- Processing Text Files -- Filtering Text -- Formatting Text -- Determining Word Count -- Redirecting Input and Output -- Handling Standard Output -- Redirecting Standard Error -- Regulating Standard Input -- Piping Commands -- Creating Here Documents -- Creating Command Lines.
Editing Text Files -- Appreciating Text Editors -- Learning About Stream Editors -- Summary -- Exam Essentials -- Review Questions -- Part II Starting Up and Configuring Your System -- Chapter 5 Explaining the Boot Process -- The Linux Boot Process -- Following the Boot Process -- Viewing the Boot Process -- The Firmware Startup -- The BIOS Startup -- The UEFI Startup -- Linux Bootloaders -- GRUB Legacy -- GRUB2 -- Alternative Bootloaders -- System Recovery -- Kernel Failures -- Root Drive Failure -- Summary -- Exam Essentials -- Review Questions -- Chapter 6 Maintaining System Startup and Services -- Looking at init -- Managing systemd Systems -- Exploring Unit Files -- Focusing on Service Unit Files -- Focusing on Target Unit Files -- Looking at systemctl -- Examining Special systemd Commands -- Managing SysV init Systems -- Understanding Runlevels -- Investigating SysV init Commands -- Digging Deeper into systemd -- Looking at systemd Mount Units -- Exploring Automount Units -- Summary -- Exam Essentials -- Review Questions -- Chapter 7 Configuring Network Connections -- Configuring Network Features -- Network Configuration Files -- Graphical Tools -- Command-Line Tools -- Basic Network Troubleshooting -- Sending Test Packets -- Finding Host Information -- Advanced Network Troubleshooting -- The netstat Command -- Examining Sockets -- Summary -- Exam Essentials -- Review Questions -- Chapter 8 Comparing GUIs -- Focusing on the GUI -- Getting to Know GNOME -- Probing KDE Plasma -- Considering Cinnamon -- Making Acquaintance with MATE -- Understanding Unity -- Setting Up Accessibility -- Serving Up the GUI -- Figuring Out Wayland -- Examining X11 -- Using Remote Desktops -- Viewing VNC -- Grasping Xrdp -- Exploring NX -- Studying SPICE -- Forwarding -- Local -- Remote -- Tunneling Your X11 Connection -- Summary -- Exam Essentials -- Review Questions.
Chapter 9 Adjusting Localization Options -- Understanding Localization -- Character Sets -- Environment Variables -- Setting Your Locale -- Installation Locale Decisions -- Changing Your Locale -- Looking at Time -- Working with Time Zones -- Setting the Time and Date -- Watching System Time -- Summary -- Exam Essentials -- Review Questions -- Part III Managing Your System -- Chapter 10 Administering Users and Groups -- Managing User Accounts -- Adding Accounts -- Maintaining Passwords -- Modifying Accounts -- Deleting Accounts -- Managing Groups -- Setting Up the Environment -- Perusing Bash Parameters -- Understanding User Entries -- Grasping Global Entries -- Querying Users -- Exploring the whoami Utility -- Understanding the who Utility -- Identifying with the id Program -- Displaying Access History with the last Utility -- Managing Disk Space Usage -- Summary -- Exam Essentials -- Review Questions -- Chapter 11 Handling Storage -- Storage Basics -- Drive Connections -- Partitioning Drives -- Automatic Drive Detection -- Partitioning Tools -- Working with fdisk -- Working with gdisk -- The GNU parted Command -- Graphical Tools -- Understanding Filesystems -- The Virtual Directory -- Maneuvering Around the Filesystem -- Formatting Filesystems -- Common Filesystem Types -- Creating Filesystems -- Mounting Filesystems -- Manually Mounting Devices -- Automatically Mounting Devices -- Managing Filesystems -- Retrieving Filesystem Stats -- Filesystem Tools -- Storage Alternatives -- Multipath -- Logical Volume Manager -- Using RAID Technology -- Summary -- Exam Essentials -- Review Questions -- Chapter 12 Protecting Files -- Understanding Backup Types -- Looking at Compression Methods -- Comparing Archive and Restore Utilities -- Copying with cpio -- Archiving with tar -- Duplicating with dd -- Replicating with rsync.
Securing Offsite/Off-System Backups -- Copying Securely via scp -- Transferring Securely via sftp -- Checking Backup Integrity -- Digesting an MD5 Algorithm -- Securing Hash Algorithms -- Summary -- Exam Essentials -- Review Questions -- Chapter 13 Governing Software -- Working with Source Code -- Downloading Source Code -- Bundling Source Code Packages -- Compiling Source Code -- Packaging Applications -- Installing and Managing Packages -- Understanding Repositories -- Summary -- Exam Essentials -- Review Questions -- Chapter 14 Tending Kernel Modules -- Exploring Kernel Modules -- Installing Kernel Modules -- Removing Kernel Modules -- Summary -- Exam Essentials -- Review Questions -- Part IV Securing Your System -- Chapter 15 Applying Ownership and Permissions -- Looking at File and Directory Permissions -- Understanding Ownership -- Controlling Access Permissions -- Exploring Special Permissions -- Managing Default Permissions -- Access Control Lists -- Context-Based Permissions -- Using SELinux -- Using AppArmor -- Understanding Linux User Types -- Types of User Accounts -- Escalating Privileges -- Restricting Users -- Summary -- Exam Essentials -- Review Questions -- Chapter 16 Looking at Access and Authentication Methods -- Getting to Know PAM -- Exploring PAM Configuration Files -- Enforcing Strong Passwords -- Locking Out Accounts -- Limiting Root Access -- Exploring PKI Concepts -- Getting Certificates -- Discovering Key Concepts -- Securing Data -- Signing Transmissions -- Using SSH -- Exploring Basic SSH Concepts -- Configuring SSH -- Generating SSH Keys -- Authenticating with SSH Keys -- Authenticating with the Authentication Agent -- Using SSH Securely -- Using VPN as a Client -- Summary -- Exam Essentials -- Review Questions -- Chapter 17 Implementing Logging Services -- Understanding the Importance of Logging -- The syslog Protocol.
The History of Linux Logging -- Basic Logging Using rsyslog -- Configuration -- Making Log Entries -- Finding Event Messages -- Journaling with systemd-journald -- Configuration -- Viewing Logs -- Summary -- Exam Essentials -- Review Questions -- Chapter 18 Overseeing Linux Firewalls -- Providing Access Control -- Looking at Firewall Technologies -- Familiarizing Yourself with firewalld -- Investigating iptables -- Understanding UFW -- Forwarding IP Packets -- Dynamically Setting Rules -- DenyHosts -- Fail2ban -- IPset -- Summary -- Exam Essentials -- Review Questions -- Chapter 19 Embracing Best Security Practices -- User Security -- Authentication Methods -- Multifactor Authentication -- Unique User Accounts -- Restricting the root Account -- System Security -- Separation of Data -- Disk Encryption -- Restricting Applications -- Preventing Unauthorized Rebooting -- Restricting Unapproved Jobs -- Banners and Messages -- Restricting USB Devices -- Looking for Trouble -- Auditing -- Network Security -- Denying Hosts -- Disabling Unused Services -- Changing Default Ports -- Using Encryption on the Network -- Summary -- Exam Essentials -- Review Questions -- Part V Troubleshooting Your System -- Chapter 20 Analyzing System Properties and Remediation -- Troubleshooting the Network -- Exploring Network Issues -- Viewing Network Performance -- Reviewing the Network's Configuration -- Troubleshooting Storage Issues -- Running Out of Filesystem Space -- Waiting on Disk I/O -- Failing Disks -- Troubleshooting the CPU -- Troubleshooting Memory -- Swapping -- Running Out of Memory -- Surviving a Lost root Password -- Summary -- Exam Essentials -- Review Questions -- Chapter 21 Optimizing Performance -- Looking at Processes -- Monitoring Processes in Real Time -- Managing Processes -- Setting Priorities -- Stopping Processes -- Summary -- Exam Essentials.
Review Questions.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
QA76.3 .B747 2019 (Browse shelf) https://ebookcentral.proquest.com/lib/uttyler/detail.action?docID=5793784 Available EBC5793784

Cover -- Title Page -- Acknowledgments -- About the Authors -- Contents at a Glance -- Contents -- Introduction -- Assessment Test -- Part I Gathering Your Tools -- Chapter 1 Preparing Your Environment -- Setting Up a Learning Space -- Using That Old Laptop -- Creating a Virtualized Environment -- Jumping to the Cloud -- Exploring Linux Distributions -- Looking at CentOS -- Looking at Ubuntu -- Looking at openSUSE -- Looking at Fedora -- Locating a Terminal -- Summary -- Chapter 2 Sifting Through Services -- What Is a Linux Server? -- Launching Services -- Listening for Clients -- Serving the Basics -- Web Servers -- Database Servers -- Mail Servers -- Serving Local Networks -- File Servers -- Print Servers -- Network Resource Servers -- Implementing Security -- Authentication Server -- Certificate Authority -- Access Server (SSH) -- Virtual Private Networks -- Proxy Server -- Monitoring -- Improving Performance -- Clustering -- Load Balancing -- Containers -- Summary -- Exam Essentials -- Review Questions -- Chapter 3 Managing Files, Directories, and Text -- Handling Files and Directories -- Viewing and Creating Files -- Copying and Moving Files -- Removing Files -- Linking Files and Directories -- Establishing a Hard Link -- Constructing a Soft Link -- Reading Files -- Reading Entire Text Files -- Reading Text File Portions -- Reading Text File Pages -- Finding Information -- Exploring File Differences -- Using Simple Pinpoint Commands -- Using Intricate Pinpoint Commands -- Summary -- Exam Essentials -- Review Questions -- Chapter 4 Searching and Analyzing Text -- Processing Text Files -- Filtering Text -- Formatting Text -- Determining Word Count -- Redirecting Input and Output -- Handling Standard Output -- Redirecting Standard Error -- Regulating Standard Input -- Piping Commands -- Creating Here Documents -- Creating Command Lines.

Editing Text Files -- Appreciating Text Editors -- Learning About Stream Editors -- Summary -- Exam Essentials -- Review Questions -- Part II Starting Up and Configuring Your System -- Chapter 5 Explaining the Boot Process -- The Linux Boot Process -- Following the Boot Process -- Viewing the Boot Process -- The Firmware Startup -- The BIOS Startup -- The UEFI Startup -- Linux Bootloaders -- GRUB Legacy -- GRUB2 -- Alternative Bootloaders -- System Recovery -- Kernel Failures -- Root Drive Failure -- Summary -- Exam Essentials -- Review Questions -- Chapter 6 Maintaining System Startup and Services -- Looking at init -- Managing systemd Systems -- Exploring Unit Files -- Focusing on Service Unit Files -- Focusing on Target Unit Files -- Looking at systemctl -- Examining Special systemd Commands -- Managing SysV init Systems -- Understanding Runlevels -- Investigating SysV init Commands -- Digging Deeper into systemd -- Looking at systemd Mount Units -- Exploring Automount Units -- Summary -- Exam Essentials -- Review Questions -- Chapter 7 Configuring Network Connections -- Configuring Network Features -- Network Configuration Files -- Graphical Tools -- Command-Line Tools -- Basic Network Troubleshooting -- Sending Test Packets -- Finding Host Information -- Advanced Network Troubleshooting -- The netstat Command -- Examining Sockets -- Summary -- Exam Essentials -- Review Questions -- Chapter 8 Comparing GUIs -- Focusing on the GUI -- Getting to Know GNOME -- Probing KDE Plasma -- Considering Cinnamon -- Making Acquaintance with MATE -- Understanding Unity -- Setting Up Accessibility -- Serving Up the GUI -- Figuring Out Wayland -- Examining X11 -- Using Remote Desktops -- Viewing VNC -- Grasping Xrdp -- Exploring NX -- Studying SPICE -- Forwarding -- Local -- Remote -- Tunneling Your X11 Connection -- Summary -- Exam Essentials -- Review Questions.

Chapter 9 Adjusting Localization Options -- Understanding Localization -- Character Sets -- Environment Variables -- Setting Your Locale -- Installation Locale Decisions -- Changing Your Locale -- Looking at Time -- Working with Time Zones -- Setting the Time and Date -- Watching System Time -- Summary -- Exam Essentials -- Review Questions -- Part III Managing Your System -- Chapter 10 Administering Users and Groups -- Managing User Accounts -- Adding Accounts -- Maintaining Passwords -- Modifying Accounts -- Deleting Accounts -- Managing Groups -- Setting Up the Environment -- Perusing Bash Parameters -- Understanding User Entries -- Grasping Global Entries -- Querying Users -- Exploring the whoami Utility -- Understanding the who Utility -- Identifying with the id Program -- Displaying Access History with the last Utility -- Managing Disk Space Usage -- Summary -- Exam Essentials -- Review Questions -- Chapter 11 Handling Storage -- Storage Basics -- Drive Connections -- Partitioning Drives -- Automatic Drive Detection -- Partitioning Tools -- Working with fdisk -- Working with gdisk -- The GNU parted Command -- Graphical Tools -- Understanding Filesystems -- The Virtual Directory -- Maneuvering Around the Filesystem -- Formatting Filesystems -- Common Filesystem Types -- Creating Filesystems -- Mounting Filesystems -- Manually Mounting Devices -- Automatically Mounting Devices -- Managing Filesystems -- Retrieving Filesystem Stats -- Filesystem Tools -- Storage Alternatives -- Multipath -- Logical Volume Manager -- Using RAID Technology -- Summary -- Exam Essentials -- Review Questions -- Chapter 12 Protecting Files -- Understanding Backup Types -- Looking at Compression Methods -- Comparing Archive and Restore Utilities -- Copying with cpio -- Archiving with tar -- Duplicating with dd -- Replicating with rsync.

Securing Offsite/Off-System Backups -- Copying Securely via scp -- Transferring Securely via sftp -- Checking Backup Integrity -- Digesting an MD5 Algorithm -- Securing Hash Algorithms -- Summary -- Exam Essentials -- Review Questions -- Chapter 13 Governing Software -- Working with Source Code -- Downloading Source Code -- Bundling Source Code Packages -- Compiling Source Code -- Packaging Applications -- Installing and Managing Packages -- Understanding Repositories -- Summary -- Exam Essentials -- Review Questions -- Chapter 14 Tending Kernel Modules -- Exploring Kernel Modules -- Installing Kernel Modules -- Removing Kernel Modules -- Summary -- Exam Essentials -- Review Questions -- Part IV Securing Your System -- Chapter 15 Applying Ownership and Permissions -- Looking at File and Directory Permissions -- Understanding Ownership -- Controlling Access Permissions -- Exploring Special Permissions -- Managing Default Permissions -- Access Control Lists -- Context-Based Permissions -- Using SELinux -- Using AppArmor -- Understanding Linux User Types -- Types of User Accounts -- Escalating Privileges -- Restricting Users -- Summary -- Exam Essentials -- Review Questions -- Chapter 16 Looking at Access and Authentication Methods -- Getting to Know PAM -- Exploring PAM Configuration Files -- Enforcing Strong Passwords -- Locking Out Accounts -- Limiting Root Access -- Exploring PKI Concepts -- Getting Certificates -- Discovering Key Concepts -- Securing Data -- Signing Transmissions -- Using SSH -- Exploring Basic SSH Concepts -- Configuring SSH -- Generating SSH Keys -- Authenticating with SSH Keys -- Authenticating with the Authentication Agent -- Using SSH Securely -- Using VPN as a Client -- Summary -- Exam Essentials -- Review Questions -- Chapter 17 Implementing Logging Services -- Understanding the Importance of Logging -- The syslog Protocol.

The History of Linux Logging -- Basic Logging Using rsyslog -- Configuration -- Making Log Entries -- Finding Event Messages -- Journaling with systemd-journald -- Configuration -- Viewing Logs -- Summary -- Exam Essentials -- Review Questions -- Chapter 18 Overseeing Linux Firewalls -- Providing Access Control -- Looking at Firewall Technologies -- Familiarizing Yourself with firewalld -- Investigating iptables -- Understanding UFW -- Forwarding IP Packets -- Dynamically Setting Rules -- DenyHosts -- Fail2ban -- IPset -- Summary -- Exam Essentials -- Review Questions -- Chapter 19 Embracing Best Security Practices -- User Security -- Authentication Methods -- Multifactor Authentication -- Unique User Accounts -- Restricting the root Account -- System Security -- Separation of Data -- Disk Encryption -- Restricting Applications -- Preventing Unauthorized Rebooting -- Restricting Unapproved Jobs -- Banners and Messages -- Restricting USB Devices -- Looking for Trouble -- Auditing -- Network Security -- Denying Hosts -- Disabling Unused Services -- Changing Default Ports -- Using Encryption on the Network -- Summary -- Exam Essentials -- Review Questions -- Part V Troubleshooting Your System -- Chapter 20 Analyzing System Properties and Remediation -- Troubleshooting the Network -- Exploring Network Issues -- Viewing Network Performance -- Reviewing the Network's Configuration -- Troubleshooting Storage Issues -- Running Out of Filesystem Space -- Waiting on Disk I/O -- Failing Disks -- Troubleshooting the CPU -- Troubleshooting Memory -- Swapping -- Running Out of Memory -- Surviving a Lost root Password -- Summary -- Exam Essentials -- Review Questions -- Chapter 21 Optimizing Performance -- Looking at Processes -- Monitoring Processes in Real Time -- Managing Processes -- Setting Priorities -- Stopping Processes -- Summary -- Exam Essentials.

Review Questions.

Description based on publisher supplied metadata and other sources.

Author notes provided by Syndetics

CHRISTINE BRESNAHAN, LINUX+, started working with computers more than 30 years ago as a system administrator. She is an Adjunct Professor at Ivy Tech Community College, where she teaches Linux Essentials, CompTIA Linux+ certification, and Python classes.

RICHARD BLUM, LINUX+, is a 30-year IT industry veteran, as both systems and network administrator for UNIX, Linux, and Microsoft servers. Rich is widely published on Linux and open source software and is an online Linux instructor for universities nationwide.

There are no comments on this title.

to post a comment.