Muutke küpsiste eelistusi

E-raamat: CompTIA Linuxplus Study Guide: Exam XK0-004, Fourth E dition: Exam XK0-004 4th Edition [Wiley Online]

  • Formaat: 928 pages
  • Ilmumisaeg: 16-Aug-2019
  • Kirjastus: Sybex Inc.,U.S.
  • ISBN-10: 1119556066
  • ISBN-13: 9781119556060
Teised raamatud teemal:
  • Wiley Online
  • Hind: 63,44 €*
  • * hind, mis tagab piiramatu üheaegsete kasutajate arvuga ligipääsu piiramatuks ajaks
  • Formaat: 928 pages
  • Ilmumisaeg: 16-Aug-2019
  • Kirjastus: Sybex Inc.,U.S.
  • ISBN-10: 1119556066
  • ISBN-13: 9781119556060
Teised raamatud teemal:

The bestselling study guide completely updated for the NEW CompTIA Linux+ Exam XK0-004

This is your one-stop resource for complete coverage of Exam XK0-004, covering 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to superior content including, assessment tests that check exam readiness, objective map, real-world scenarios, hands-on exercises, key topic exam essentials, and challenging chapter review questions. 

Linux is a UNIX-based operating system originally created by Linus Torvalds with the help of developers around the world. Developed under the GNU General Public License, the source code is free. Because of this Linux is viewed by many organizations and companies as an excellent, low-cost, secure alternative to expensive OSs, such as Microsoft Windows. The CompTIA Linux+ exam tests a candidate's understanding and familiarity with the Linux Kernel. As the Linux server market share continues to grow, so too does demand for qualified and certified Linux administrators.

Building on the popular Sybex Study Guide approach, this book will provide 100% coverage of the NEW Linux+ Exam XK0-004 objectives. The book contains clear and concise information on all Linux administration topic, and includes practical examples and insights drawn from real-world experience. 

  • Hardware and System Configuration
  • Systems Operation and Maintenance
  • Security
  • Linux Troubleshooting and Diagnostics
  • Automation and Scripting

You’ll also have access to an online test bank, including a bonus practice exam, electronic flashcards, and a searchable PDF of key terms.

Introduction xxix
Assessment Test xlii
Part I Gathering Your Tools 1(122)
Chapter 1 Preparing Your Environment
3(12)
Setting Up a Learning Space
4(4)
Using That Old Laptop
4(1)
Creating a Virtualized Environment
5(2)
Jumping to the Cloud
7(1)
Exploring Linux Distributions
8(6)
Looking at CentOS
9(1)
Looking at Ubuntu
10(2)
Looking at openSUSE
12(1)
Looking at Fedora
13(1)
Locating a Terminal
14(1)
Summary
14(1)
Chapter 2 Sifting Through Services
15(24)
What Is a Linux Server?
16(3)
Launching Services
17(1)
Listening for Clients
18(1)
Serving the Basics
19(5)
Web Servers
20(1)
Database Servers
21(1)
Mail Servers
22(2)
Serving Local Networks
24(5)
File Servers
25(1)
Print Servers
26(1)
Network Resource Servers
26(3)
Implementing Security
29(3)
Authentication Server
29(1)
Certificate Authority
30(1)
Access Server (SSH)
31(1)
Virtual Private Networks
31(1)
Proxy Server
32(1)
Monitoring
32(1)
Improving Performance
32(1)
Clustering
32(1)
Load Balancing
33(1)
Containers
33(1)
Summary
33(1)
Exam Essentials
34(1)
Review Questions
35(4)
Chapter 3 Managing Files, Directories, and Text
39(44)
Handling Files and Directories
40(15)
Viewing and Creating Files
40(5)
Copying and Moving Files
45(7)
Removing Files
52(3)
Linking Files and Directories
55(4)
Establishing a Hard Link
55(2)
Constructing a Soft Link
57(2)
Reading Files
59(7)
Reading Entire Text Files
59(2)
Reading Text File Portions
61(4)
Reading Text File Pages
65(1)
Finding Information
66(11)
Exploring File Differences
67(2)
Using Simple Pinpoint Commands
69(4)
Using Intricate Pinpoint Commands
73(4)
Summary
77(1)
Exam Essentials
77(1)
Review Questions
78(5)
Chapter 4 Searching and Analyzing Text
83(40)
Processing Text Files
84(11)
Filtering Text
84(5)
Formatting Text
89(4)
Determining Word Count
93(2)
Redirecting Input and Output
95(10)
Handling Standard Output
95(1)
Redirecting Standard Error
96(2)
Regulating Standard Input
98(2)
Piping Commands
100(2)
Creating Here Documents
102(1)
Creating Command Lines
103(2)
Editing Text Files
105(11)
Appreciating Text Editors
105(5)
Learning About Stream Editors
110(6)
Summary
116(1)
Exam Essentials
117(1)
Review Questions
118(5)
Part II Starting Up and Configuring Your System 123(150)
Chapter 5 Explaining the Boot Process
125(22)
The Linux Boot Process
126(2)
Following the Boot Process
126(1)
Viewing the Boot Process
127(1)
The Firmware Startup
128(2)
The BIOS Startup
128(1)
The UEFI Startup
129(1)
Linux Bootloaders
130(7)
GRUB Legacy
131(3)
GRUB2
134(2)
Alternative Bootloaders
136(1)
System Recovery
137(4)
Kernel Failures
137(2)
Root Drive Failure
139(2)
Summary
141(1)
Exam Essentials
141(2)
Review Questions
143(4)
Chapter 6 Maintaining System Startup and Services
147(40)
Looking at init
148(1)
Managing systemd Systems
149(18)
Exploring Unit Files
150(2)
Focusing on Service Unit Files
152(5)
Focusing on Target Unit Files
157(2)
Looking at systemctl
159(3)
Examining Special systemd Commands
162(5)
Managing SysV init Systems
167(9)
Understanding Runlevels
168(3)
Investigating SysV init Commands
171(5)
Digging Deeper into systemd
176(3)
Looking at systemd Mount Units
176(2)
Exploring Automount Units
178(1)
Summary
179(1)
Exam Essentials
179(2)
Review Questions
181(6)
Chapter 7 Configuring Network Connections
187(30)
Configuring Network Features
188(13)
Network Configuration Files
188(3)
Graphical Tools
191(2)
Command-Line Tools
193(8)
Basic Network Troubleshooting
201(4)
Sending Test Packets
201(1)
Finding Host Information
202(3)
Advanced Network Troubleshooting
205(4)
The netstat Command
205(3)
Examining Sockets
208(1)
Summary
209(1)
Exam Essentials
210(2)
Review Questions
212(5)
Chapter 8 Comparing GUIs
217(36)
Focusing on the GUI
218(13)
Getting to Know GNOME
219(2)
Probing KDE Plasma
221(2)
Considering Cinnamon
223(2)
Making Acquaintance with MATE
225(2)
Understanding Unity
227(1)
Setting Up Accessibility
228(3)
Serving Up the GUI
231(4)
Figuring Out Wayland
232(2)
Examining X11
234(1)
Using Remote Desktops
235(5)
Viewing VNC
236(2)
Grasping Xrdp
238(1)
Exploring NX
239(1)
Studying SPICE
240(1)
Forwarding
240(5)
Local
242(1)
Remote
243(1)
Tunneling Your X11 Connection
244(1)
Summary
245(1)
Exam Essentials
245(2)
Review Questions
247(6)
Chapter 9 Adjusting Localization Options
253(20)
Understanding Localization
254(2)
Character Sets
254(1)
Environment Variables
255(1)
Setting Your Locale
256(3)
Installation Locale Decisions
256(1)
Changing Your Locale
257(2)
Looking at Time
259(6)
Working with Time Zones
259(1)
Setting the Time and Date
260(4)
Watching System Time
264(1)
Summary
265(1)
Exam Essentials
266(1)
Review Questions
267(6)
Part III Managing Your System 273(136)
Chapter 10 Administering Users and Groups
275(40)
Managing User Accounts
276(18)
Adding Accounts
276(12)
Maintaining Passwords
288(2)
Modifying Accounts
290(2)
Deleting Accounts
292(2)
Managing Groups
294(3)
Setting Up the Environment
297(3)
Perusing Bash Parameters
298(1)
Understanding User Entries
299(1)
Grasping Global Entries
300(1)
Querying Users
300(4)
Exploring the whoami Utility
300(1)
Understanding the who Utility
301(1)
Identifying with the id Program
302(1)
Displaying Access History with the last Utility
303(1)
Managing Disk Space Usage
304(4)
Summary
308(1)
Exam Essentials
308(2)
Review Questions
310(5)
Chapter 11 Handling Storage
315(28)
Storage Basics
316(2)
Drive Connections
316(1)
Partitioning Drives
317(1)
Automatic Drive Detection
317(1)
Partitioning Tools
318(5)
Working with fdisk
318(2)
Working with gdisk
320(2)
The GNU parted Command
322(1)
Graphical Tools
322(1)
Understanding Filesystems
323(3)
The Virtual Directory
324(2)
Maneuvering Around the Filesystem
326(1)
Formatting Filesystems
326(3)
Common Filesystem Types
326(2)
Creating Filesystems
328(1)
Mounting Filesystems
329(2)
Manually Mounting Devices
329(1)
Automatically Mounting Devices
330(1)
Managing Filesystems
331(2)
Retrieving Filesystem Stats
331(1)
Filesystem Tools
332(1)
Storage Alternatives
333(5)
Multipath
333(1)
Logical Volume Manager
334(2)
Using RAID Technology
336(2)
Summary
338(1)
Exam Essentials
338(2)
Review Questions
340(3)
Chapter 12 Protecting Files
343(30)
Understanding Backup Types
344(2)
Looking at Compression Methods
346(3)
Comparing Archive and Restore Utilities
349(13)
Copying with cpio
349(3)
Archiving with tar
352(5)
Duplicating with dd
357(2)
Replicating with rsync
359(3)
Securing Offsite/Off-System Backups
362(4)
Copying Securely via scp
362(1)
Transferring Securely via sftp
363(3)
Checking Backup Integrity
366(2)
Digesting an MD5 Algorithm
366(1)
Securing Hash Algorithms
367(1)
Summary
368(1)
Exam Essentials
368(2)
Review Questions
370(3)
Chapter 13 Governing Software
373(24)
Working with Source Code
374(6)
Downloading Source Code
374(1)
Bundling Source Code Packages
375(4)
Compiling Source Code
379(1)
Packaging Applications
380(12)
Installing and Managing Packages
381(4)
Understanding Repositories
385(7)
Summary
392(1)
Exam Essentials
393(1)
Review Questions
394(3)
Chapter 14 Tending Kernel Modules
397(12)
Exploring Kernel Modules
398(4)
Installing Kernel Modules
402(2)
Removing Kernel Modules
404(1)
Summary
405(1)
Exam Essentials
405(2)
Review Questions
407(2)
Part IV Securing Your System 409(124)
Chapter 15 Applying Ownership and Permissions
411(28)
Looking at File and Directory Permissions
412(8)
Understanding Ownership
412(2)
Controlling Access Permissions
414(3)
Exploring Special Permissions
417(1)
Managing Default Permissions
418(2)
Access Control Lists
420(2)
Context-Based Permissions
422(8)
Using SELinux
423(4)
Using AppArmor
427(3)
Understanding Linux User Types
430(1)
Types of User Accounts
430(1)
Escalating Privileges
430(1)
Restricting Users
431(4)
Summary
435(1)
Exam Essentials
436(1)
Review Questions
437(2)
Chapter 16 Looking at Access and Authentication Methods
439(34)
Getting to Know PAM
440(12)
Exploring PAM Configuration Files
440(4)
Enforcing Strong Passwords
444(3)
Locking Out Accounts
447(4)
Limiting Root Access
451(1)
Exploring PKI Concepts
452(3)
Getting Certificates
453(1)
Discovering Key Concepts
453(1)
Securing Data
454(1)
Signing Transmissions
455(1)
Using SSH
455(13)
Exploring Basic SSH Concepts
456(2)
Configuring SSH
458(2)
Generating SSH Keys
460(2)
Authenticating with SSH Keys
462(2)
Authenticating with the Authentication Agent
464(2)
Using SSH Securely
466(2)
Using VPN as a Client
468(1)
Summary
469(1)
Exam Essentials
469(2)
Review Questions
471(2)
Chapter 17 Implementing Logging Services
473(14)
Understanding the Importance of Logging
474(3)
The syslog Protocol
474(2)
The History of Linux Logging
476(1)
Basic Logging Using rsyslog
477(3)
Configuration
477(2)
Making Log Entries
479(1)
Finding Event Messages
479(1)
Journaling with systemd-journald
480(3)
Configuration
480(1)
Viewing Logs
481(2)
Summary
483(1)
Exam Essentials
484(1)
Review Questions
485(2)
Chapter 18 Overseeing Linux Firewalls
487(26)
Providing Access Control
488(2)
Looking at Firewall Technologies
490(15)
Familiarizing Yourself with firewalld
491(4)
Investigating iptables
495(5)
Understanding UFW
500(5)
Forwarding IP Packets
505(1)
Dynamically Setting Rules
506(2)
DenyHosts
506(1)
Fail2ban
506(1)
IPset
507(1)
Summary
508(1)
Exam Essentials
508(2)
Review Questions
510(3)
Chapter 19 Embracing Best Security Practices
513(20)
User Security
514(4)
Authentication Methods
514(2)
Multifactor Authentication
516(1)
Unique User Accounts
517(1)
Restricting the root Account
517(1)
System Security
518(7)
Separation of Data
518(1)
Disk Encryption
519(1)
Restricting Applications
520(1)
Preventing Unauthorized Rebooting
520(2)
Restricting Unapproved Jobs
522(1)
Banners and Messages
523(1)
Restricting USB Devices
523(1)
Looking for Trouble
524(1)
Auditing
524(1)
Network Security
525(3)
Denying Hosts
525(1)
Disabling Unused Services
525(1)
Changing Default Ports
526(1)
Using Encryption on the Network
526(2)
Summary
528(1)
Exam Essentials
528(2)
Review Questions
530(3)
Part V Troubleshooting Your System 533(116)
Chapter 20 Analyzing System Properties and Remediation
535(32)
Troubleshooting the Network
536(13)
Exploring Network Issues
536(4)
Viewing Network Performance
540(6)
Reviewing the Network's Configuration
546(3)
Troubleshooting Storage Issues
549(5)
Running Out of Filesystem Space
549(1)
Waiting on Disk I/O
550(3)
Failing Disks
553(1)
Troubleshooting the CPU
554(2)
Troubleshooting Memory
556(4)
Swapping
556(4)
Running Out of Memory
560(1)
Surviving a Lost root Password
560(2)
Summary
562(1)
Exam Essentials
562(1)
Review Questions
563(4)
Chapter 21 Optimizing Performance
567(14)
Looking at Processes
568(2)
Monitoring Processes in Real Time
570(3)
Managing Processes
573(4)
Setting Priorities
574(1)
Stopping Processes
574(3)
Summary
577(1)
Exam Essentials
577(2)
Review Questions
579(2)
Chapter 22 Investigating User Issues
581(16)
Troubleshooting Access
582(6)
Local
582(4)
Remote
586(1)
Authentication
587(1)
Examining File Obstacles
588(3)
File Permissions
588(1)
Directory Permissions
589(1)
File Creation
590(1)
Exploring Environment and Shell Issues
591(2)
Summary
593(1)
Exam Essentials
593(1)
Review Questions
594(3)
Chapter 23 Dealing with Linux Devices
597(22)
Communicating with Linux Devices
598(7)
Device Interfaces
598(2)
The /dev Directory
600(1)
The /proc Directory
601(3)
The /sys Directory
604(1)
Working with Devices
605(8)
Finding Devices
605(3)
Working with PCI Cards
608(1)
Working with USB Devices
609(1)
Supporting Monitors
610(1)
Using Printers
611(2)
Using Hot Pluggable Devices
613(2)
Detecting Dynamic Devices
613(1)
Working with Dynamic Devices
614(1)
Summary
615(1)
Exam Essentials
616(1)
Review Questions
617(2)
Chapter 24 Troubleshooting Application and Hardware Issues
619(30)
Dealing with Storage Problems
620(6)
Exploring Common Issues
620(2)
Dealing with Specialized Issues
622(4)
Uncovering Application Permission Issues
626(2)
Analyzing Application Dependencies
628(5)
Versioning
629(1)
Updating Issues
629(1)
Patching
630(1)
Dealing with Libraries
630(1)
Exploring Environment Variable Issues
631(1)
Gaining GCC Compatibility
631(1)
Perusing Repository Problems
632(1)
Looking at SELinux Context Violations
633(1)
Exploring Firewall Blockages
633(2)
Unrestricting ACLs
633(1)
Unblocking Ports
634(1)
Unblocking Protocols
635(1)
Troubleshooting Additional Hardware Issues
635(8)
Looking at Helpful Hardware Commands
635(4)
Investigating Other Hardware Problems
639(4)
Summary
643(1)
Exam Essentials
643(2)
Review Questions
645(4)
Part VI Automating Your System 649(68)
Chapter 25 Deploying Bash Scripts
651(26)
The Basics of Shell Scripting
652(5)
Running Multiple Commands
652(1)
Redirecting Output
653(1)
Piping Data
654(1)
The Shell Script Format
655(1)
Running the Shell Script
656(1)
Advanced Shell Scripting
657(6)
Displaying Messages
657(1)
Using Variables
658(3)
Command-Line Arguments
661(1)
The Exit Status
662(1)
Writing Script Programs
663(10)
Command Substitution
663(1)
Performing Math
664(2)
Logic Statements
666(3)
Loops
669(4)
Summary
673(1)
Exam Essentials
674(1)
Review Questions
675(2)
Chapter 26 Automating Jobs
677(20)
Running Scripts in Background Mode
678(2)
Running in the Background
678(1)
Running Multiple Background Jobs
679(1)
Running Scripts Without a Console
680(1)
Sending Signals
681(2)
Interrupting a Process
682(1)
Pausing a Process
682(1)
Job Control
683(4)
Viewing Jobs
683(3)
Restarting Stopped Jobs
686(1)
Running Like Clockwork
687(5)
Scheduling a Job Using the at Command
687(3)
Scheduling Regular Scripts
690(2)
Summary
692(1)
Exam Essentials
693(1)
Review Questions
694(3)
Chapter 27 Controlling Versions with Git
697(20)
Understanding Version Control
698(2)
Setting Up Your Git Environment
700(3)
Committing with Git
703(7)
Merging Versions
710(3)
Summary
713(1)
Exam Essentials
713(2)
Review Questions
715(2)
Part VII Realizing Virtual and Cloud Environments 717(52)
Chapter 28 Understanding Cloud and Virtualization Concepts
719(16)
Considering Cloud Services
720(3)
What Is Cloud Computing?
720(1)
What Are the Cloud Services?
721(2)
Understanding Virtualization
723(4)
Hypervisors
723(2)
Types of Hypervisors
725(1)
Hypervisor Templates
726(1)
Exploring Containers
727(2)
What Are Containers?
727(1)
Container Software
728(1)
Container Templates
729(1)
Exercise
729(1)
Summary
730(1)
Exam Essentials
731(1)
Review Questions
732(3)
Chapter 29 Inspecting Cloud and Virtualization Services
735(20)
Focusing on VM Tools
736(4)
Looking at libvirt
736(1)
Viewing virsh
737(1)
Managing with Virtual Machine Manager
738(2)
Understanding Bootstrapping
740(6)
Booting with Shell Scripts
740(1)
Kick-Starting with Anaconda
741(3)
Initializing with Cloud-init
744(2)
Exploring Storage Issues
746(1)
Considering Network Configurations
747(3)
Virtualizing the Network
747(1)
Configuring Virtualized NICs
748(2)
Summary
750(1)
Exam Essentials
751(1)
Review Questions
752(3)
Chapter 30 Orchestrating the Environment
755(14)
Understanding Orchestration Concepts
756(4)
Probing Procedures
757(1)
Analyzing Attributes
758(2)
Provisioning the Data Center
760(3)
Coding the Infrastructure
761(1)
Automating the Infrastructure
762(1)
Comparing Agent and Agentless
762(1)
Investigating the Inventory
763(1)
Looking at Container Orchestration Engines
763(2)
Embracing Kubernetes
763(1)
Inspecting Docker Swarm
764(1)
Surveying Mesos
764(1)
Summary
765(1)
Exam Essentials
765(1)
Review Questions
766(3)
Appendix Answers to Review Questions 769(68)
Chapter 2 Sifting Through Services
770(3)
Chapter 3 Managing Files, Directories, and Text
773(4)
Chapter 4 Searching and Analyzing Text
777(4)
Chapter 5 Explaining the Boot Process
781(3)
Chapter 6 Maintaining System Startup and Services
784(4)
Chapter 7 Configuring Network Connections
788(3)
Chapter 8 Comparing GUIs
791(4)
Chapter 9 Adjusting Localization Options
795(3)
Chapter 10 Administering Users and Groups
798(3)
Chapter 11 Handling Storage
801(2)
Chapter 12 Protecting Files
803(1)
Chapter 13 Governing Software
804(2)
Chapter 14 Tending Kernel Modules
806(2)
Chapter 15 Applying Ownership and Permissions
808(2)
Chapter 16 Looking at Access and Authentication Methods
810(1)
Chapter 17 Implementing Logging Services
811(2)
Chapter 18 Overseeing Linux Firewalls
813(2)
Chapter 19 Embracing Best Security Practices
815(2)
Chapter 20 Embracing Best Security Practices
817(1)
Chapter 21 Optimizing Performance
818(2)
Chapter 22 Investigating User Issues
820(2)
Chapter 23 Dealing with Linux Devices
822(2)
Chapter 24 Troubleshooting Application and Hardware Issues
824(2)
Chapter 25 Deploying Bash Scripts
826(1)
Chapter 26 Automating Jobs
827(2)
Chapter 27 Controlling Versions with Git
829(2)
Chapter 28 Understanding Cloud and Virtualization Concepts
831(1)
Chapter 29 Inspecting Cloud and Virtualization Services
832(2)
Chapter 30 Orchestrating the Environment
834(3)
Index 837
CHRISTINE BRESNAHAN, LINUX+, started working with computers more than 30 years ago as a system administrator. She is an Adjunct Professor at Ivy Tech Community College, where she teaches Linux Essentials, CompTIA Linux+ certification, and Python classes.

RICHARD BLUM, LINUX+, is a 30-year IT industry veteran, as both systems and network administrator for UNIX, Linux, and Microsoft servers. Rich is widely published on Linux and open source software and is an online Linux instructor for universities nationwide.