did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780782143898

Linux+TM Study Guide: Exam XK0-002, 3rd Edition

by
  • ISBN13:

    9780782143898

  • ISBN10:

    078214389X

  • Edition: 3rd
  • Format: Paperback
  • Copyright: 2005-03-01
  • Publisher: Sybex
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $49.99 Save up to $1.50
  • Buy New
    $48.49
    Add to Cart Free Shipping Icon Free Shipping

    PRINT ON DEMAND: 2-4 WEEKS. THIS ITEM CANNOT BE CANCELLED OR RETURNED.

Supplemental Materials

What is included with this book?

Summary

Here's the book you need to prepare for CompTIA's updated Linux+ exam, #XK0-002. This Study Guide was developed to meet the exacting requirements of today's certification candidates. In addition to the consistent and accessible instructional approach that has earned Sybex the reputation as the leading publisher for certification self-study guides, this book provides: Clear and concise information on setting up and administering a Linux system Practical examples and insights drawn from real-world experience Leading-edge exam preparation software, including a Windows- and Linux-compatible testing engine and electronic flashcards You'll also find authoritative coverage of key exam topics, including: Determining hardware requirements Configuring client network services Managing storage devices and file systems Establishing security requirements Monitoring and troubleshooting problems Creating procedures and documentation Look to Sybex for the knowledge and skills needed to succeed in today's competitive IT marketplace.This book has been reviewed and approved as CompTIA Authorized Quality Curriculum (CAQC). Students derive a number of important study advantages with CAQC materials, including coverage of all exam objectives, implementation of important instructional design principles, and instructional reviews that help students assess their learning comprehension and readiness for the exam.

Author Biography

Roderick Smith is a Linux networking expert and the author of several books, including Linux Power Tools, also from Sybex.

Table of Contents

Introduction xvii
Assessment Test xxvi
Linux Installation
1(72)
Evaluating Computer Requirements
2(4)
Workstations
3(1)
Servers
3(1)
Dedicated Appliances
4(1)
Special Needs
4(2)
Deciding What Hardware to Use
6(9)
A Rundown of PC Hardware
6(2)
CPU
8(1)
RAM
9(1)
Hard Disk Space
10(1)
Network Hardware
11(1)
Video Hardware
12(1)
Miscellaneous Hardware
13(2)
Determining Software Needs
15(11)
A Rundown of Linux Distributions
15(3)
Common Workstation Programs
18(3)
Common Server Programs
21(2)
Useful Software on Any System
23(2)
Validating Software Requirements
25(1)
Planning Disk Partitioning
26(8)
The PC Partitioning System
26(1)
Linux Partition Requirements
27(1)
Common Optional Partitions
28(2)
Linux Filesystem Options
30(2)
Partitioning Tools
32(2)
Selecting an Installation Method
34(4)
Media Options
34(2)
Methods of Interaction during Installation
36(2)
Installing Linux
38(1)
Configuring Boot Loaders
39(11)
The Role of the Boot Loader
40(1)
Available Boot Loaders
41(9)
Post-Installation X Configuration
50(13)
Selecting an X Server
50(4)
Configuring X
54(9)
Summary
63(1)
Exam Essentials
63(2)
Commands in This Chapter
65(1)
Review Questions
66(4)
Answers to Review Questions
70(3)
Text-Mode Commands
73(56)
Basic Command Shell Use
74(4)
Starting a Shell
74(1)
Viewing Files and Directories
75(1)
Launching Programs
76(1)
Using Shell Shortcuts
77(1)
File Manipulation Commands
78(13)
Navigating the Linux Filesystem
79(3)
Manipulating Files
82(3)
Manipulating Directories
85(1)
Locating Files
86(2)
Examining Files' Contents
88(2)
Redirection and Pipes
90(1)
File Permissions
91(11)
Account and Ownership Basics
91(1)
File Access Permissions
92(5)
Changing File Ownership and Permissions
97(3)
Setting Default Permissions
100(1)
Using ACLs
101(1)
Editing Files with Vi
102(4)
Vi Modes
103(1)
Basic Text-Editing Procedures
103(3)
Saving Changes
106(1)
Using sed and awk
106(2)
Setting Environment Variables
108(4)
Where to Set Environment Variables
108(2)
The Meanings of Common Environment Variables
110(2)
Basic Shell Scripting
112(6)
Beginning a Shell Script
113(1)
Using External Commands
113(2)
Using Variables
115(2)
Using Conditional Expressions
117(1)
Summary
118(1)
Exam Essentials
119(1)
Commands in This Chapter
119(2)
Review Questions
121(4)
Answers to Review Questions
125(4)
User Management
129(50)
Linux Multiuser Concepts
130(9)
User Accounts: The Core of a Multiuser System
130(5)
Groups: Linking Users Together for Productivity
135(1)
Mapping UIDs and GIDs to Users and Groups
136(2)
The Importance of Home Directories
138(1)
Configuring User Accounts
139(10)
Adding Users
139(2)
Modifying User Accounts
141(7)
Deleting Accounts
148(1)
Configuring Groups
149(3)
Adding Groups
149(1)
Modifying Group Information
149(3)
Deleting Groups
152(1)
Common User and Group Strategies
152(2)
The User Private Group
153(1)
Project Groups
153(1)
Multiple Group Membership
154(1)
Account Security
154(6)
Enforcing User Password Security
155(2)
Steps for Reducing the Risk of Compromised Passwords
157(1)
Disabling Unused Accounts
158(1)
Using Shadow Passwords
158(2)
Controlling System Access
160(8)
Accessing Common Servers
160(5)
Controlling root Access
165(1)
Setting Filesystem Quotas
166(2)
Summary
168(1)
Exam Essentials
168(3)
Review Questions
171(4)
Answers to Review Questions
175(4)
Disk Management
179(56)
Storage Hardware Identification
180(4)
Types of Storage Devices
180(2)
Linux Storage Hardware Configuration
182(2)
Partition Management and Maintenance
184(10)
Using fdisk to Create Partitions
184(2)
Creating New Filesystems
186(1)
Using a Combined Tool
187(2)
Checking a Filesystem for Errors
189(1)
Adding Swap Space
190(4)
Partition Control
194(14)
Identifying Partitions
194(1)
Mounting and Unmounting Partitions
195(5)
Using Network Filesystems
200(2)
Using df
202(1)
Defining Standard Filesystems
203(1)
Using RAID
204(4)
Writing to Optical Discs
208(5)
Linux Optical Disc Tools
208(2)
A Linux Optical Disc Example
210(2)
Creating Cross-Platform Discs
212(1)
Backing Up and Restoring a Computer
213(12)
Common Backup Hardware
214(2)
Common Backup Programs
216(6)
Planning a Backup Schedule
222(1)
Preparing for Disaster: Backup Recovery
223(2)
Summary
225(1)
Exam Essentials
225(1)
Commands in This Chapter
226(2)
Review Questions
228(4)
Answers to Review Questions
232(3)
Package and Process Management
235(70)
Package Concepts
236(4)
File Collections
236(1)
The Installed File Database
237(1)
Rebuilding Packages
238(2)
Installing and Removing Packages
240(25)
RPM Packages
240(7)
Debian Packages
247(7)
Tarballs
254(4)
Compiling Source Code
258(4)
GUI Package Management Tools
262(3)
Package Dependencies and Conflicts
265(4)
Real and Imagined Package Dependency Problems
265(1)
Workarounds to Package Dependency Problems
266(3)
Startup Script Problems
269(1)
Starting and Stopping Services
269(8)
Starting and Stopping via SysV Scripts
269(4)
Editing inetd.conf
273(2)
Editing xinetd.conf or xinetd.d Files
275(1)
Custom Startup Files
276(1)
Setting the Runlevel
277(3)
Understanding the Role of the Runlevel
277(1)
Using init or telinit to Change the Runlevel
277(2)
Permanently Changing the Runlevel
279(1)
Running Jobs at Specific Times
280(3)
The Role of Cron
280(1)
Creating System Cron Jobs
280(2)
Creating User Cron Jobs
282(1)
Using at
282(1)
Setting Process Permissions
283(2)
The Risks of SUID and SGID Programs
284(1)
When to Use SUID or SGID
284(1)
Finding SUID or SGID Programs
284(1)
Managing Processes
285(9)
Examining Process Lists with ps
286(5)
Restricting Processes' CPU Use
291(1)
Killing Processes
292(1)
Foreground and Background Processes
293(1)
Summary
294(1)
Exam Essentials
295(1)
Commands in This Chapter
296(1)
Review Questions
297(4)
Answers to Review Questions
301(4)
Networking
305(64)
Understanding Networks
306(8)
Basic Functions of Network Hardware
306(1)
Types of Network Hardware
307(2)
Network Packets
309(1)
Network Protocol Stacks
309(5)
Network Addressing
314(5)
Types of Network Addresses
314(3)
Resolving Hostnames
317(1)
Network Ports
318(1)
Basic Network Configuration
319(10)
Network Hardware Configuration
319(1)
DHCP Configuration
320(1)
Static IP Address Configuration
321(2)
Using GUI Configuration Tools
323(1)
Initiating a PPP Connection
324(5)
Network Server Configuration
329(17)
Super Server Configuration
329(4)
Delivering IP Addresses with DHCP
333(2)
Delivering Hostnames with DNS
335(1)
Delivering Files with Samba
336(2)
Delivering Files with NFS
338(1)
Setting Up a Remote Access Server
339(1)
Configuring Mail Servers
340(4)
Configuring Web Servers
344(2)
Using Network Clients
346(4)
Using X Programs Remotely
346(1)
Using an E-Mail Client
347(3)
Configuring Routing
350(1)
Remote System Administration
351(4)
Text-Mode Logins
351(2)
GUI Logins
353(1)
File Transfers
353(1)
Remote Administration Protocols
354(1)
Using NIS
355(2)
Network Diagnostic Tools
357(2)
Testing Basic Connectivity
357(1)
Tracing a Route
358(1)
Checking Network Status
359(1)
Summary
359(1)
Exam Essentials
360(1)
Commands in This Chapter
361(1)
Review Questions
362(4)
Answers to Review Questions
366(3)
Security
369(42)
Sources of Security Vulnerability
370(5)
Physical Access Problems
371(1)
Stolen Passwords
371(1)
Local Program Bugs
371(1)
Server Bugs
372(1)
Denial-of-Service Attacks
373(1)
Encryption Issues
373(1)
The Human Element
374(1)
Physical Security
375(1)
What an Intruder Can Do with Physical Access
375(1)
Steps for Mitigating Damage from Physical Attacks
375(1)
Firewall Configuration
376(11)
Where a Firewall Fits in a Network
377(1)
Linux Firewall Software
378(1)
Common Server Ports
378(3)
Using iptables
381(6)
Super Server Security
387(2)
Controlling Access via TCP Wrappers
387(1)
Controlling Access via xinetd
388(1)
Intrusion Detection
389(7)
Symptoms of Intrusion
389(1)
Using Snort
390(2)
Using PortSentry
392(1)
Using Tripwire
393(1)
Using chkrootkit
394(1)
Using Package Manager Checksums
394(1)
Monitoring Log Files
395(1)
Security Auditing
396(4)
Checking for Open Ports
396(2)
Reviewing Accounts
398(2)
Verifying Installed Files and Packages
400(1)
Imposing User Resource Limits
400(1)
Summary
401(1)
Exam Essentials
402(2)
Review Questions
404(4)
Answers to Review Questions
408(3)
System Documentation
411(38)
Documenting System Configuration
412(6)
Documenting the Installation
413(1)
Maintaining an Administrator's Log
414(1)
Backing Up Important Configuration Files
415(1)
Documenting Official Policies and Procedures
416(2)
Establishing Normal Performance Measures
418(4)
Documenting CPU Load
418(2)
Documenting Memory Load
420(1)
Documenting Disk Use
420(1)
Collecting System Statistics
421(1)
Configuring Log Files
422(7)
Understanding syslogd
423(1)
Setting Logging Options
423(2)
Rotating Log Files
425(3)
Using a Remote Server for Log Files
428(1)
Using Log Files
429(5)
Which Log Files Are Important?
429(1)
Using Log Files to Identify Problems
430(1)
Tools to Help Scan Log Files
431(3)
System Documentation and Help Resources
434(6)
Using Man Pages
435(2)
Using Info Pages
437(1)
Using Miscellaneous Program Documentation
438(1)
Using Internet-Based Help Resources
439(1)
Summary
440(1)
Exam Essentials
441(1)
Commands in This Chapter
442(1)
Review Questions
443(4)
Answers to Review Questions
447(2)
Hardware
449(62)
Checking Hardware Configuration
450(11)
Checking Cabling
451(2)
Checking IRQ, DMA, and I/O Settings
453(2)
Checking ATA Devices
455(2)
Checking SCSI Devices
457(2)
Checking BIOS Settings
459(2)
Configuring Power Management
461(2)
Activating Kernel Support
461(1)
Using APM
462(1)
Using ACPI
462(1)
Configuring External Hardware Devices
463(5)
Configuring PCMCIA Devices
463(1)
Configuring USB Devices
464(1)
Configuring IEEE-1394 Devices
465(1)
Configuring Legacy External Devices
466(2)
Configuring Basic Printing
468(19)
The Linux Printing Architecture
468(1)
Understanding PostScript and Ghostscript
469(2)
Running a Printing System
471(1)
Configuring BSD LPD and LPRng
472(5)
Configuring CUPS
477(5)
Printing to Windows or Samba Printers
482(1)
Monitoring and Controlling the Print Queue
483(4)
Using Scanners in Linux
487(2)
Understanding Scanner Hardware
487(1)
Choosing and Using Linux Scanner Software
488(1)
Diagnosing Hardware Problems
489(11)
Core System Problems
489(2)
ATA Problems
491(3)
SCSI Problems
494(1)
Peripherals Problems
495(3)
Identifying Supported and Unsupported Hardware
498(1)
Using an Emergency Boot Disk
499(1)
Using dmesg for System Diagnosis
499(1)
Summary
500(1)
Exam Essentials
501(1)
Commands in This Chapter
502(1)
Review Questions
503(4)
Answers to Review Questions
507(4)
Glossary 511(30)
Index 541

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program