TestOut Linux Pro – English 3.1.x LESSON PLAN Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Table of Contents Course Overview .................................................................................................. 4 Section 0.1: Introduction ....................................................................................... 6 Section 1.1: The Shell ........................................................................................... 8 Section 1.2: Help................................................................................................. 10 Section 1.3: Environment Variables .................................................................... 12 Section 1.4: Aliases ............................................................................................ 14 Section 1.5: Text Editors ..................................................................................... 15 Section 1.6: Redirection and Piping .................................................................... 17 Section 1.7: Directories ....................................................................................... 19 Section 1.8: Files ................................................................................................ 21 Section 1.9: Links................................................................................................ 23 Section 1.11: Locating and Searching Files ........................................................ 26 Section 2.1: Installation Design ........................................................................... 28 Section 2.2: Linux Installation ............................................................................. 30 Section 2.3: Localization ..................................................................................... 32 Section 3.1: Linux Boot Process ......................................................................... 34 Section 3.2: BootLoaders .................................................................................... 36 Section 3.3: Runlevels ........................................................................................ 38 Section 3.4: Init Scripts ....................................................................................... 40 Section 3.5: System Shutdown ........................................................................... 42 Section 4.1: X Window System ........................................................................... 44 Section 4.2: Display Managers ........................................................................... 46 Section 4.3: Accessibility .................................................................................... 48 Section 5.1: Red Hat Package Manager (RPM) ................................................. 50 Section 5.2: Debian Package Manager (DPKG) ................................................. 52 Section 5.3: Shared Libraries .............................................................................. 54 Section 6.1: User and Group Overview............................................................... 56 Section 6.2: User Management........................................................................... 58 Section 6.3: Group Management ........................................................................ 60 Section 7.1: Disk Partitions ................................................................................. 62 Section 7.2: File Systems ................................................................................... 64 Section 7.3: Mounting File Systems .................................................................... 66 Section 7.4: File System Maintenance ................................................................ 68 Section 7.5: Disk Quotas .................................................................................... 70 Section 7.6: Ownership ....................................................................................... 72 Section 7.7: Permissions .................................................................................... 74 Section 7.8: Archive and Backup ........................................................................ 77 Section 8.1: Device Drivers ................................................................................. 79 Section 8.2: Kernel Module Management ........................................................... 81 Section 8.3: Hotplug and Coldplug Devices ........................................................ 83 Section 9.1: Processes ....................................................................................... 85 Section 9.2: Process Management ..................................................................... 87 Section 9.3: Task Management .......................................................................... 89 Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 9.4: Print Management ........................................................................... 91 Section 9.5: Time Management .......................................................................... 94 Section 9.6: Mail Transfer Agent (MTA) .............................................................. 97 Section 9.7: Structured Query Language (SQL) ................................................. 99 Section 10.1: System Log Files ........................................................................ 101 Section 10.2: Scripts ......................................................................................... 103 Section 10.3: Text Stream Processing .............................................................. 105 Section 11.1: Networking Overview .................................................................. 107 Section 11.2: Network Interface Configuration .................................................. 109 Section 11.3: Routing Configuration ................................................................. 111 Section 11.4: Hostname and DNS Configuration .............................................. 113 Section 11.5: Network Troubleshooting ............................................................ 115 Section 12.1: Root Usage ................................................................................. 117 Section 12.2: User Security and Restriction ...................................................... 119 Section 12.3: Network Security ......................................................................... 121 Section 12.4: File Auditing ................................................................................ 123 Section 12.5: Login Blocking ............................................................................. 125 Section 12.6: Xinetd and Inetd Super Daemons ............................................... 127 Section 12.7: OpenSSH .................................................................................... 129 Section 12.8: SSH Port Tunneling .................................................................... 131 Section 12.9: Public Key Authentication ........................................................... 133 Section 12.10: Gnu Privacy Guard (GnuPG) .................................................... 135 Practice Exams ................................................................................................. 136 Appendix A: Approximate Time for the Course ................................................. 137 Appendix B: LabSim for CompTIA’s Linux+ Powered by LPI Changes ............ 142 Appendix B: Linux+ Powered BY LPI Exams: LX0-101 and LX0-102 ............... 143 Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Course Overview This course prepares students for CompTIA’s Linux+ Exams; LX0-101 and LX0102. It focuses on running GNU and Unix commands from the command line, installing and configuring Linux, and maintaining and securing the Linux system. Module 0 – Introduction This module introduces the students to the Linux+ certification exams; LX0-101 and LX0-102. Module 1 – Using Linux This module introduces the students to using Linux. They will learn about the Linux shell, help options, the role of environment variables, using aliases, text editors, redirection and piping available on a Linux system. Students will also learn about commands to manage files and directories, links, FHS, and how to locate and search files for specific character patterns. Module 2 – Installation and Localization This module examines designing an effective installation, installing a Linux operating system, and configuring country and language-specific settings. Module 3 – Boot and Shutdown In this module students will learn concepts about the Linux boot process, installing bootloaders, managing runlevels, using init scripts, and shutting down the system. Module 4 – User Interfaces and Desktops This module teaches the students about configuring an X Window system and display managers, and providing accessibility to people with impairments. Module 5 – Software Installation This module discusses installing application packages using RPM and Debian, and managing shared libraries. Module 6 – Users and Groups This module examines the fundamentals of managing user and group accounts. Module 7 – Disk and File System Management In this module students will learn concepts about managing disk partitions, managing, monitoring and maintaining file systems, restricting disk space to users, managing file and directory ownership and permissions, and archiving data on a Linux system. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Module 8 – Hardware Installation This module discusses hardware installation. Topics covered include; device drivers, managing kernel modules, and managing Hotplug and Coldplug devices. Module 9 – Processes and System Services In this module students will learn the basics of managing and prioritizing processes, managing tasks, printing, and time. This module also provides an overview of using Structured Query Language (SQL). Module 10 – System Monitoring This module discusses concepts of system monitoring; system logging, using scripts to execute commands and processing a text stream. Module 11 – Networking This module examines the basics of networking, configuring network interfaces, configuring routing, configuring DNS settings, and troubleshooting network communication problems. Module 12 – Security This module examines the fundamentals of security on the Linux system. This includes the root user account, promoting user security and restrictions, increasing network security, file auditing and login blocking. Students will also become familiar with using the xinetd and inetd super daemons, OpenSSH and SSH port tunneling, a public key to authenticate to a computer, and the GnuPG encryption tool. Practice Exams In Practice Exams students will have the opportunity to test themselves and verify that they understand the concepts and are ready to take the certification exams. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 0.1: Introduction Summary The Linux+ certification is a vendor neutral certification designed to certify applicants can complete general Linux tasks across many different distributions. In the latest version of the Linux+ certification CompTIA has partnered with the Linux Professional Institute (LPI) to identify what knowledge is necessary to be an effective Linux administrator, thus the CompTIA Linux+ certification is essentially the same as the Linux Professional Institute Level 1 certification. The Linux+ certification certifies that applicants have the skills and knowledge of a junior level Linux administrator, one with about six months to a year’s worth of experience on the job, including the following skills: Managing the system using the command line interface. Performing maintenance tasks such as adding users, backing up the system, shutting down and rebooting the system. Managing your display. Connecting the system to a network. The Linux+ certification has been updated. To obtain the certification, applicants must pass two exams: The LX0-101 exam covers the following: o Basic system architecture o Linux installation and software management o Unix commands o Devices o Linux file systems o Linux file system hierarchy The LX0-102 exam covers details about: o Linux shell o Scripting and managing data o User interfaces and desktops o Administrative tasks o Essential system services o Basic networking fundamentals o Linux security This course covers content for the Linux+ exam. If possible, we recommend that students study for both exams before taking either exam. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Lecture Focus Questions: What exams are required for you to pass to certify for the CompTIA Linux+ Powered by LPI certification? Why do many administrators choose to use a command line interface on a Linux server? What is a Linux distribution? Video/Demo Time 0.1.1 Instructor Introduction 2:11 0.1.2 Linux+ Certification Overview 5:07 0.1.3 Linux Operating System Introduction Total 13:12 20:30 Total Time About 20 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 1.1: The Shell Summary This section introduces the student to the shell that administrators use to control a Linux operating system. Students will become familiar with the: Common shell types Common shell characteristics Tips for working in the shell Common commands used from the shell Shell configuration files used when the shell starts Students will learn how to: Navigate through shells and execute shell commands. Use the command history. Use tab completion while executing a shell command. Locate and edit shell configuration files. Use exec to execute a command. Execute common commands such as pwd, whoami, uname, su, and exit. Linux+ Objectives: 103.1 Work on the command line Candidates should be able to interact with shells and commands using the command line. The objective assumes the bash shell. o Use single shell commands and one line command sequences to perform basic tasks on the command line. o Use and edit command history. o Invoke commands inside and outside the defined path. 105.1 Customize and use the shell environment Candidates should be able to customize shell environments to meet users' needs. Candidates should be able to modify global and user profiles. o Set environment variables (e.g. PATH) at login or when spawning a new shell. o Write BASH functions for frequently used sequences of commands. o Maintain skeleton directories for new user accounts. o Set command search path with the proper directory. Lecture Focus Questions: What is a shell? What are the basic differences between common shells? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. What is the difference between how executable programs are run by a Linux shell as compared to a DOS environment? What is the difference between how a Linux shell recognizes the path to executable programs compared to how a DOS environment recognizes the path? What common commands are used to navigate through shells? What types of items can Tab complete be used to complete once you start typing the entities' name? What does the tilde symbol (~) in the prompt indicate? Video/Demo 1.1.1 Shell Overview Time 4:23 1.1.3 Shell Commands 19:02 1.1.4 Using Shell Commands 12:41 1.1.6 Shell Configuration Files 9:29 1.1.7 Viewing Shell Configuration Files 7:18 Total 52:53 Number of Exam Questions 14 questions Total Time About 70 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 1.2: Help Summary This section provides information about sources that can be used to find syntax, options available, and uses for the commands that are available on a Linux computer. Students will become familiar with help options available for a Linux system: Manual (man) pages Info pages On-screen help Whatis database Students will learn how to: Access documentation about a specified command. Search for information about a command. Use on-screen help to display the syntax and available options of a command. Linux+ Objectives: 103.1 Work on the command line Candidates should be able to interact with shells and commands using the command line. The objective assumes the bash shell. o Use single shell commands and one-line command sequences to perform basic tasks on the command line. Lecture Focus Questions: What are the differences between the man utility and info utility? What types of files are stored in the /usr/share/doc directory? How can you access on-screen help for each command? Video/Demo Time 1.2.1 Help 9:29 1.2.2 Accessing Help 9:17 Total 18:46 Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Lab/Activity Get Help 1 Get Help 2 Get Help 3 Number of Exam Questions 2 questions Total Time About 40 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 1.3: Environment Variables Summary This section discusses the role of environment variables. Concepts discussed include: User-defined variables Common environment variables Common environment variable commands Students will learn how to: Display the value of currently set environment variables. Set the value of an environment variable. Linux+ Objectives: 103.1 Work on the command line Candidates should be able to interact with shells and commands using the command line. The objective assumes the bash shell. o Use and modify the shell environment including defining, referencing and exporting environment variables. 105.1 Customize and use the shell environment Candidates should be able to customize shell environments to meet users' needs. Candidates should be able to modify global and user profiles. o Set environment variables (e.g. PATH) at login or when spawning a new shell. o Write BASH functions for frequently used sequences of commands. Lecture Focus Questions: What is the role of environment variables? What is the standard syntax for environment variable identifiers? How do you preserve the current values of the PATH environment variable when adding a new value to it? How do you make a new value assigned to an environment variable persistent across all shell sessions? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo Time 1.3.1 Environment Variables 16:18 1.3.2 Managing Environment Variables 10:10 Total 26:28 Lab/Activity View Environment Variables Number of Exam Questions 13 questions Total Time About 45 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 1.4: Aliases Summary In this section students will learn how to use aliases to perform a specific action invoked at startup or from the shell. Students will learn how to: Display a list of the currently defined aliases on the system. Create a custom command using an alias. Create a single alias that includes multiple commands. Remove an alias. Linux+ Objectives: 105.1 Customize and use the shell environment Candidates should be able to customize shell environments to meet users' needs. Candidates should be able to modify global and user profiles. Lecture Focus Questions: What is the purpose of an alias? What happens if you create a new alias with an alias name that already exists? When would it be important to make an alias persistent? Video/Demo Time 1.4.1 Aliases 6:42 1.4.2 Using Aliases 6:50 Total 13:32 Number of Exam Questions 1 question Total Time About 15 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 1.5: Text Editors Summary This section examines using text editors to create and modify text files. Concepts covered include: Vim (vi improved) modes: o Command mode o Command line mode o Edit modes Common vi commands Students will learn how to: Navigate a text file using vi. Open and edit an existing text file using the vi editor. Create a new file using vim. Linux+ Objectives: 103.8 Perform basic file editing operations using vi Candidates should be able to edit text files using vi. This objective includes vi navigation, basic vi modes, inserting, editing, deleting, copying and finding text. o Navigate a document using vi. o Use basic vi modes. o Insert, edit, delete, copy and find text. Lecture Focus Questions: Why is it important to know how to run a text editor on a Linux system? What are the four different modes available in vim, and how can you tell the current mode? Which vi mode would you use to overwrite existing text? Video/Demo Time 1.5.1 Text Editors 15:21 1.5.2 Using vim 12:04 Total 27:25 Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Lab/Activity Create a New File Modify an Existing File Number of Exam Questions 14 questions Time About 55 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 1.6: Redirection and Piping Summary This section provides information about using redirection and piping to create, send, or gather information on a Linux system. Concepts covered include: The role of redirection The role of piping Redirection and piping commands The xargs command Students will learn how to: Redirect the standard output from the screen to a file. Redirect and append new content to an existing file. Redirect a standard error from a command to a file. Redirect the standard input to a command. Pipe the output of a command to the input of another command. Use the pipe command to search a file for specified text. Use the pipe command to create a text stream. Linux+ Objectives: 103.4 Use streams, pipes and redirects Candidates should be able to redirect streams and connect them in order to efficiently process textual data. Tasks include redirecting standard input, standard output and standard error, piping the output of one command to the input of another command, using the output of one command as arguments to another command and sending output to both stdout and a file. o Redirecting standard input, standard output and standard error. o Pipe the output of one command to the input of another command. o Use the output of one command as arguments to another command. o Send output to both stdout and a file. Lecture Focus Questions: What is the difference between redirection and piping? When might you choose to redirect the input of a command? What are the three default file descriptors that Linux uses to classify information for a command? How can you overcome the 128 KB shell command size restriction? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo 1.6.1 Redirection Time 10:21 1.6.2 Piping 7:12 1.6.3 Using Redirection and Piping 9:19 1.6.5 Xargs 2:49 Total 29:41 Number of Exam Questions 10 questions Total Time About 40 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 1.7: Directories Summary This section discusses basic commands used to manage directories: pwd cd ls mkdir cp –r cp –R mv rmdir rm Students will learn how to: Navigate directories using the cd command. Display the current working directory using the pwd command. Display a list of the contents of a directory including hidden files. Create a new directory using the mkdir command. Delete an empty directory and also a directory with existing files. Copy the entire directory including files and subdirectories to a new location. Move directories to a new location using the mv command. Linux+ Objectives: 103.3 Perform basic file management Candidates should be able to use the basic Linux commands to manage files and directories. o Copy, move and remove files and directories individually. o Copy multiple files and directories recursively. o Remove files and directories recursively. Lecture Focus Questions: What is the shortcut to move directly to the home directory when using the cd command? What is the difference in function between the rm command and the rmdir command? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo Time 1.7.1 Directory Management 15:14 1.7.2 Manage Directories 11:52 Total 27:06 Lab/Activity Find the Working Directory View Directory Information Find a Hidden Directory Create Directories Delete Directories Number of Exam Questions 7 questions Total Time About 60 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 1.8: Files Summary This section examines basic commands that are used to manage files on a Linux system: touch cat less head tail file cp mv rm shred lsattr Students will learn how to: Create and view files from the command line. Use cat, less, head, and tail to view the contents of a text file. Delete and move files from one directory to another. Delete an existing directory including all subdirectories and files. Linux+ Objectives: 103.3 Perform basic file management Candidates should be able to use the basic Linux commands to manage files and directories. o Copy, move and remove files and directories individually. o Copy multiple files and directories recursively. o Remove files and directories recursively. Lecture Focus Questions: How can you display only the first few lines of a file? Why is it more common to use the tail command than the head command? How can you use the tail command to monitor a specified file when troubleshooting the system? What is different about file extensions in Linux compared to file extensions in a DOS environment? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo Time 1.8.1 File Management 19:08 1.8.2 Managing Files 15:36 Total 34:44 Lab/Activity View the Contents of a File View a List of Available Shells Delete Files Move Files Delete Files and Directories Number of Exam Questions 8 questions Total Time About 60 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 1.9: Links Summary This section discusses using links to point to another file. Concepts covered include: Link types: o Hard link o Symbolic link Commands for creating hard links and symbolic links: o ln source link_name o cp source link_name Students will learn how to: Determine where a link points to. Create a hard link to share access to data. Create a symbolic link to a specified directory. Linux+ Objectives: 104.6 Create and change hard and symbolic links Candidates should be able to create and manage hard and symbolic links to a file. o Create links. o Identify hard and/or softlinks. o Copying versus linking files. o Use links to support system administration tasks. Lecture Focus Questions: What is an inode? What is the difference between a hard link and a symbolic link? How can you identify a symbolic link when using the ls -l command? Which type of link is similar to shortcuts in Windows? Which utilities can you use to create links? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo Time 1.9.1 Links 6:50 1.9.2 Creating Links 7:54 Total 14:44 Lab/Activity Create a Hard Link Create a Symbolic Link Number of Exam Questions 5 questions Total Time About 35 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 1.10: Filesystem Hierarchy Standard (FHS) Summary In this section students will explore the Filesystem Hierarchy Standard (FHS) which is a subset of the Linux Standards Base (LSB). Students will become familiar with the standard set of directories defined by the FHS. Students will learn how to: Determine the correct location for files under the FHS. Linux+ Objectives: 104.7 Find system files and place files in the correct location Candidates should be thoroughly familiar with the Filesystem Hierarchy Standard (FHS), including typical file locations and directory classifications. o Understand the correct locations of files under the FHS. o Find files and commands on a Linux system. o Know the location and purpose of important files and directories as defined in the FHS. Lecture Focus Questions: What are the benefits to the Filesystem Hierarchy Standard (FHS)? Why does a Linux system use a more structured file system than the Windows OS? What should you be aware of when saving files in the /temp directory? Which directory is specified by Filesystem Hierarchy Standard (FHS) to hold temporarily mounted filesystems? Video/Demo 1.10.1 Filesystem Hierarchy Standard (FHS) Time 18:53 Number of Exam Questions 7 questions Total Time About 25 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 1.11: Locating and Searching Files Summary This section discusses the details about locating and searching files. Concepts covered include: Commands to find file locations o find o locate o which o whereis o type Commands to search file text for specific words or character patterns: o grep o egrep o fgrep Students will learn how to: Determine the location of a command and view detailed information about it. Linux+ Objectives: 103.7 Search text files using regular expressions Candidates should be able to manipulate files and text data using regular expressions. This objective includes creating simple regular expressions containing several notational elements. It also includes using regular expression tools to perform searches through a filesystem or file content. o Create simple regular expressions containing several notational elements. o Use regular expression tools to perform searches through a filesystem or file content 104.7 Find system files and place files in the correct location Candidates should be thoroughly familiar with the Filesystem Hierarchy Standard (FHS), including typical file locations and directory classifications. o Understand the correct locations of files under the FHS. o Find files and commands on a Linux system. o Know the location and purpose of important files and directories as defined in the FHS. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Lecture Focus Questions: What is the advantage of using the locate utility over the find utility? What are the disadvantages? When would you use the which command to locate a file? Which utilities can you use to locate a file? Which utilities can you use to locate and get information about a command? What does it mean when a command is hashed? How can you discover the category of a command? What commands can you use to search for text within files? Video/Demo Time 1.11.1 File Location Utilities 10:51 1.11.2 Finding Files 12:41 1.11.4 Content Search Utilities 10:03 1.11.5 Finding File Content Total 4:49 38:24 Number of Exam Questions 19 questions Total Time About 60 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 2.1: Installation Design Summary This section examines the general steps to design an effective installation: Perform a needs assessment Pick a distribution Determine the hardware requirements Plan the file system Plan the partitions Identify software Identify the users Gather network information Select an installation source Students will learn how to: Design and gather information to plan a Linux installation. Linux+ Objectives: 102.1 Design hard disk layout Candidates should be able to design a disk partitioning scheme for a Linux system. o Allocate filesystems and swap space to separate partitions or disks. o Tailor the design to the intended use of the system. o Ensure the /boot partition conforms to the hardware architecture requirements for booting. Lecture Focus Questions: Why is it important to create a detailed plan prior to deploying a Linux installation? What elements should you consider when performing a needs assessment? What factors should you consider when selecting a Linux distribution? How can you ensure that specific hardware is compatible with the Linux distribution you have selected? Why must the /etc, /bin, /sbin, /lib, and /dev directories all be on the same partition? Which user account is automatically created when Linux is installed? What types of installation sources are available for Linux? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo 2.1.1 Installation Design Time 24:07 Number of Exam Questions 6 questions Total Time About 35 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 2.2: Linux Installation Summary In this section students will learn the general steps necessary to install a Linux operating system: Start the install Select a language Set the system time Format partitions Select applications and services Set the root password Specify a host name Configure network connections Configure services Add new users and groups Configure the hardware settings Students will learn how to: Install a Linux operating system. Linux+ Objectives: 102.1 Design hard disk layout Candidates should be able to design a disk partitioning scheme for a Linux system. o Allocate filesystems and swap space to separate partitions or disks. o Tailor the design to the intended use of the system. o Ensure the /boot partition conforms to the hardware architecture requirements for booting. Lecture Focus Questions: What might you have to do to ensure that the system will boot from the correct installation media? Under what conditions should you select the UTC for the system time? How can you create more than four partitions on a Linux system? What are the characteristics of a secure password? What is the purpose of the bootloader? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo 2.2.1 Linux Installation 2.2.2 Installing Linux Total Time 2:41 20:54 23:35 Number of Exam Questions 2 questions Total Time About 30 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 2.3: Localization Summary This section examines how to configure country and language-specific settings for various applications. Concepts covered include: Configurable environment variables Commands to configure local settings: o locate o iconv Students will learn how to: Localize a system with the appropriate country, monetary and languagespecific settings. Linux+ Objectives: 107.3 Localisation and internationalisation Candidates should be able to localize a system in a different language than English. As well, an understanding of why LANG=C is useful when scripting. o Locale settings. o Timezone settings. Lecture Focus Questions: Why is it important to configure locale settings? What type of elements can be configured using the locale settings? What is the syntax of the locale settings? Which environment variable overrides all other locale settings? Video/Demo Time 2.3.1 Locale Settings 9:38 2.3.2 Configuring Locale Settings 5:19 Total 14:57 Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Number of Exam Questions 5 questions Total Time About 25 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 3.1: Linux Boot Process Summary This section examines the general stages of the Linux boot process: BIOS Boot loader OS Kernel Init Students will learn how to: Direct the system through the boot process. Linux+ Objectives: 101.2 Boot the system Candidates should be able to guide the system through the booting process. o Provide common commands to the boot loader and options to the kernel at boot time o Demonstrate knowledge of the boot sequence from BIOS to boot completion o Check boot events in the log file Lecture Focus Questions: What are the four general stages for the boot process? When is the initrd image loaded into memory? What is the default initial program? Which component mounts the root partition? What is the process ID of the initial program? Where is the primary boot loader located? Video/Demo 3.1.1 Linux Boot Process Time 7:36 Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Number of Exam Questions 7 questions Time About 20 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 3.2: BootLoaders Summary This section discusses the following Bootloaders: The Grand Unified Boot Loader (GRUB) utility GRUB2 utility Students will learn how to: View the grub configuration file and gather pertinent information about the system. Configure the GRUB configuration file to boot as required by your setup. Linux+ Objectives: 102.2 Install a boot manager Candidates should be able to select, install and configure a boot manager. o Providing alternative boot locations and backup boot options. o Install and configure a boot loader such as GRUB Legacy. o Perform basic configuration changes for GRUB 2 o Interact with the boot loader. Lecture Focus Questions: What is the path to the GRUB configuration file? How do you change the default operating system when using GRUB? Which setting displays the available operating systems during system boot up? What is the syntax used to identify the root file system for each operating system in the GRUB menu? How can you require authentication for the options in the GRUB menu? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo 3.2.1 GRUB Time 9:22 3.2.2 Using GRUB 10:23 3.2.6 GRUB2 17:44 3.2.7 Using GRUB2 Total 9:16 46:45 Lab/Activity Read the Boot File Configure the GRUB Boot File Number of Exam Questions 14 questions Total Time About 80 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 3.3: Runlevels Summary In this section students will learn about managing runlevels. Concepts covered include: Runlevels 0-6 The role of the /etc/inittab file The contents of the /etc/inittab file Commands to determine and change the current runlevel Kernel options to customize Linux boot parameters. Students will learn how to: Identify the current runlevel and change it as required by your system circumstances. Change the default runlevel. Supply kernel options at boot time to customize how the system boots. Linux+ Objectives: 101.2 Boot the system Candidates should be able to guide the system through the booting process. o Provide common commands to the boot loader and options to the kernel at boot time 101.3 Change runlevels and shutdown or reboot system Candidates should be able to manage the runlevel of the system. This objective includes changing to single user mode, shutdown or rebooting the system. Candidates should be able to alert users before switching runlevel and properly terminate processes. This objective also includes setting the default runlevel. o Set the default runlevel. o Change between run levels including single user mode. Lecture Focus Questions: Which file affects the default runlevels? Why would you set the runlevel to 1? What is the difference in functionality between a runlevel 1 and runlevel 3? Which runlevel reboots the system, and which runlevel shuts the system down? What commands can be used to change the runlevel? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. How can you enter kernel options during the system boot up? How can you identify the current and previous runlevels? Video/Demo Time 3.3.1 Runlevels 8:16 3.3.2 Managing Runlevels 6:34 3.3.7 Using Kernel Options 6:05 Total 20:55 Lab/Activity Find the Runlevel Change the Runlevel Change the Default Runlevel Number of Exam Questions 5 questions Total Time About 45 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 3.4: Init Scripts Summary This section examines the basics of using init scripts. Concepts covered include: The role of init scripts Init script directories o rc (BSD and System V) o halt (BSD and System V) o boot (BSDF) or rc.sysinit (System V) o boot.local (BSD) Commands to manage daemons and the init scripts o service o insserv o chkconfig Details about upstart Details about systemd Students will learn how to: Use init scripts to start and stop services on the system. Determine the default runlevels for init scripts. Linux+ Objectives: 101.3 Change runlevels and shutdown or reboot system Candidates should be able to manage the runlevel of the system. This objective includes changing to single user mode, shutdown or rebooting the system. Candidates should be able to alert users before switching runlevel and properly terminate processes. o Knowledge of basic features of system and Upstart. Lecture Focus Questions: What is the role and function of init scripts? Which distribution stores the init scripts in the /etc/rc.d/init.d directory? What does the /etc/init.d/rc5.d directory contain? How would you view what init scripts are available in your distribution? What command runs an init script? What identifier kills or starts an init script? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo Time 3.4.1 Init Scripts 17:15 3.4.2 Using Init Scripts 19:35 3.4.7 Upstart and systemd 13:46 3.4.8 Using upstart and systemd 13:44 Total 64:20 Lab/Activity Change a Service Runlevel Determine Service Status Restart a Service Number of Exam Questions 10 questions Time About 95 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 3.5: System Shutdown Summary This section discusses commands for shutting down the system. Students will learn how to: Use the shutdown, halt, and init commands at the shell prompt to properly shutdown or reboot the system. Linux+ Objectives: 101.3 Change runlevels and shutdown or reboot system Candidates should be able to manage the runlevel of the system. This objective includes changing to single user mode, shutdown or rebooting the system. Candidates should be able to alert users before switching runlevel and properly terminate processes. This objective also includes setting the default runlevel. o Set the default runlevel. o Change between run levels including single user mode. o Shutdown and reboot from the command line. o Alert users before switching runlevels or other major system event. o Properly terminate processes. Lecture Focus Questions: What happens when you run init 0 at the shell? How would you send a message to all users on the system without shutting down the system? Which commands shut the system down immediately? What command will reboot the system after 15 minutes? What is the purpose of the /etc/shutdown.allow? How can you terminate the shutdown process after it is already running? Video/Demo Time 3.5.1 System Shutdown 4:12 3.5.2 Shutting Down the System 5:10 Total 9:22 Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Lab/Activity Shut Down Immediately Shut Down with Notification Shut Down and Reboot Number of Exam Questions 7 questions Time About 35 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 4.1: X Window System Summary This section discusses configuring an X Window system. Concepts covered include: X Window components: o X server o Window manager o Desktop environment o X font server Configuring the X server o Required information o Configuration files o Sections in configuration files o Utilities used with X server Configuring a window manager or desktop environment on a System V distribution Commands to start a specific application if the system does not have a graphical interface enabled Students will learn how to: Configure the X server settings. Linux+ Objectives: 106.1 Install and configure X11 Candidates should be able to install and configure X11. o Verify that the video card and monitor are supported by an X server. o Awareness of the X font server. o Basic understanding and knowledge of the X Window configuration file. Lecture Focus Questions: What three components make up the X Windows System? What is the additional optional component? Why does the xorg.conf file contain a warning about editing the file? What is the function of the module section in the xorg.conf or XF86Config file? What types of information do you need to gather before configuring the X server? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. What are the two popular desktop managers? Which utilities can you use to configure XFree86 X server? How can you launch a desktop manager if the system does not have a graphical interface enabled? Video/Demo 4.1.1 X Window System 4.1.3 X Window System Configuration 4.1.4 Configuring X Window System Total Time 9:15 19:19 7:50 36:24 Number of Exam Questions 10 questions Total Time About 50 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 4.2: Display Managers Summary This section discusses details about configuring display managers. Concepts covered include: Main display manager types for Linux: o X Display Manger (XDM) o Gnome Display Manager (GDM) o KDE Display Manager (KDM) Tasks to complete when configuring the display manager Paths to XDM configuration files: o /etc/X11/xdm o /usr/X11R6/lib/x11/xdm XDM configuration files o Xresources o Xservers o xdm-config o Xaccess KDM configuration files o /etc/kde/kdm/kdmrc o /etc/x11/ksm/kdmrc General sections of the kdmrc configuration file o General o XDMCP o Xgreeter The GDM configuration file is /etc/X11/gdm/gdm.conf Sections of the /etc/X11/gdm/gdm.conf file o Xserver definitions o Servers o Security options o XDMCP support o XDMCP chooser o Greeter Students will learn how to: Enable or disable an XDM display manager. Use the Xresources and Xserver files to configure the display manager. Configure the display manager to use X terminals. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Linux+ Objectives: 106.2 Setup a display manager Candidates should be able setup and customize a display manager. This objective covers the display managers XDM (X Display Manger), GDM (Gnome Display Manager) and KDM (KDE Display Manager). o Turn the display manager on or off. o Change the display manager greeting. o Change default color depth for the display manager. o Configure display managers for use by X-stations. Lecture Focus Questions: What is the function of a display manager? What are the three main display manager types? Which display manager uses the same configuration files as the XDM display manager? What two different commands can you use to start the display manager? How can you change the color depth of the display manager? Video/Demo Time 4.2.1 Display Managers 15:44 4.2.2 Configuring Display Managers 10:09 Total 25:53 Number of Exam Questions 7 questions Total Time About 45 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 4.3: Accessibility Summary This section explores providing accessibility to Linux systems to people with tactile, audible, and visual impairments. Concepts covered include: Keyboard accessibility options: o Sticky keys o Mouse keys o Slow keys o Toggle keys o Repeat rate o Bounce keys Visual accessibility options: o Onscreen keyboard o Mouse gesture o Screen reader o Screen magnifier o Braille devices o Desktop themes Students will learn how to: Configure the Assistive Technologies options for people with impairments. Use the GOK onscreen keyboard to send characters to an application. Configure Orca for use by visually impaired users. Configure High Contrast Large Desktop Themes for visually impaired users. Linux+ Objectives: 106.3 Accessibility Demonstrate knowledge and awareness of accessibility technologies. o Keyboard Accessibility Settings (AccessX?) o Visual Settings and Themes o Assistive Technology (ATs) Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Lecture Focus Questions: What types of disabilities does the accessibility option support? Which accessibility option can be set to assist users who have trouble pressing multiple keys at the same time? What feature can you use to compensate for a user who has Parkinson's disease and accidentally presses a single key multiple times? What accessibility options are available for the visually impaired user? Which types of alternative input methods are supported by GOK? Video/Demo 4.3.1 Accessibility 4.3.2 Configuring Accessibility Settings Total Time 8:22 13:04 21:26 Number of Exam Questions 11 questions Total Time About 35 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 5.1: Red Hat Package Manager (RPM) Summary This section examines using the RPM utility to install application packages. Concepts covered include: Red Hat Package Manager (RPM) o The role of RPM o RPM naming conventions o Commands for managing RPM packages rpm rpm2cpio Yellowdog Updater Modified (YUM) o The role of YUM o Uses /etc/yum.conf as the configuration file o Uses /etc/yum.repos.d to keep a .repo file o Uses /var/usr.yum.log as a log file o Commands for managing RPM packages: yum yumdownloader createrepo Students will learn how to: Use rpm to test dependencies before installing a package. Install a package using the rpm -ihv options to install and view the progress of the installation. Uninstall a package using rpm. Determine if a package has been installed. Use yum install a package and all the required dependencies. Linux+ Objectives: 102.5 Use RPM and YUM package management Candidates should be able to perform package management using RPM and YUM tools. o Install, re-install, upgrade and remove packages using RPM and YUM. o Obtain information on RPM packages such as version, status, dependencies, integrity and signatures. o Determine what files a package provides, as well as find which package a specific file comes from. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Lecture Focus Questions: What is the role of a package manager? How does the RPM naming convention help you to quickly select a package with a specific version? How would you check the authenticity of a package? What sources are available for obtaining packages? What utility will extract files from an RPM package without installing the package? What is the difference between how RPM handles dependencies and how YUM handles dependencies? How would you verify if a package has been installed? What is the main configuration file for the YUM package? Video/Demo Time 5.1.1 RPM Part 1 16:55 5.1.2 RPM Part 2 9:49 5.1.3 Managing RPM Packages 12:32 5.1.5 Yellowdog Update Manager (YUM) 6:24 5.1.6 Installing RPM Packages with YUM 5:11 Total 50:51 Number of Exam Questions 22 questions Total Time About 80 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 5.2: Debian Package Manager (DPKG) Summary This section explores using Debian packages to install packages. Details include: Commands used to manage Debian packages: o dpkg o apt-cache o apt-get o aptitude Students will learn how to: Install and uninstall a new package using the dpkg command. Use the apt-cache command to view information about installed packages. Download and install a package using the apt-get command. Linux+ Objectives: 102.4 Use Debian package management Candidates should be able to perform package management using the Debian package tools. o Install, upgrade and uninstall Debian binary packages. o Find packages containing specific files or libraries which may or may not be installed. o Obtain package information like version, content, dependencies, package integrity and installation status (whether or not the package is installed). Lecture Focus Questions: When would you use Debian packages instead of RPM packages? How can you identify a Debian package from an RPM package? What dpkg option prevents a package from being installed if a newer version of the package already exists on the computer? What command would you use to display all of the package’s dependencies? What command for Debian is similar to the YUM tool for RPM packages? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo 5.2.1 Debian Package Manager (DPKG) 5.2.2 Managing Debian Packages Total Time 10:11 7:26 17:37 Number of Exam Questions 16 questions Total Time About 40 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 5.3: Shared Libraries Summary This section provides information about managing shared libraries. Concepts covered include: The role of shared libraries Types of shared libraries: o Dynamic o Static Commands to manage libraries o ldd o ldconfig Students will learn how to: Identify a daemon's required shared libraries. Recognize a broken library link. Linux+ Objectives: 102.3 Manage shared libraries Candidates should be able to determine the shared libraries that executable programs depend on and install them when necessary. o Identify shared libraries. o Identify the typical locations of system libraries. o Load shared libraries. Lecture Focus Questions: What is the purpose of a shared library? What is the difference between a dynamic shared library and a static shared library? What does it mean if a library file name contains .so in the name? What command would you use to identify library dependencies? What are the management complications for shared libraries? Which file contains a cached list of dynamic shared libraries? What are the methods to configure additional dynamic libraries on a Linux system? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo Time 5.3.1 Shared Libraries 6:59 5.3.2 Managing Shared Libraries 2:22 Total 9:21 Number of Exam Questions 10 questions Time About 25 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 6.1: User and Group Overview Summary This section provides the following information about user and group accounts: Types of users and groups: o Standard user o System user o Primary group o Secondary groups Files the user and group databases are stored in: o /etc/passwd o /etc/shadow o /etc/group o /etc/gshadow Students will learn how to: View the user account information in the /etc/passwd file. View the group membership information in the /etc/group file. Linux+ Objectives: 107.1 Manage user and group accounts and related system files Candidates should be able to add, remove, suspend and change user accounts. o Add, modify and remove users and groups. o Manage user/group info in password/group databases. o Create and manage special purpose and limited accounts. Lecture Focus Questions: Which file stores user accounts? Which file contains the passwords for each user account? What are the differences between standard user accounts and system user accounts? What is default primary group for each user? How can you determine if a user account is locked? How is the GECOS field typically used? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo 6.1.1 User and Group Overview 6.1.2 User and Group File Review Total Time 19:14 9:43 28:57 Lab/Activity View User Account Information View Group Membership Information Number of Exam Questions 8 questions Total Time About 50 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 6.2: User Management Summary This section provides information about managing user accounts. Details include: Configuration files used when managing user accounts: o /etc/default/useradd o /etc/login.defs o /etc/skel Commands to manage user accounts: o useradd o passwd o usermod o userdel Students will learn how to: Create, rename, lock and unlock a user account. Change a user's password. Rename or remove a user account. Linux+ Objectives: 107.1 Manage user and group accounts and related system files Candidates should be able to add, remove, suspend and change user accounts. o Add, modify and remove users and groups. o Manage user/group info in password/group databases. o Create and manage special purpose and limited accounts. Lecture Focus Questions: Which directory contains configuration file templates that are copied into a new user's home directory? When using useradd to create a new user account, what types of default values create the user account? How can you view all the default values in the /etc/default/useradd file? What is the purpose of the /etc/login.defs file? How would you create a user using useradd without using the default values in /etc/default/useradd file? At the shell prompt, how do you create a password for a user? What does it mean if a user account is locked? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Which command deletes a user and their home directory at the same time? Video/Demo Time 6.2.1 Useradd Command 9:59 6.2.2 Passwd Command 3:26 6.2.3 Usermod and Userdel Commands 5:37 6.2.4 Managing Users 9:28 Total 28:30 Lab/Activity Create a User Account Rename a User Account Delete a User Change Your Password Change a User's Password Lock and Unlock User Accounts Number of Exam Questions 14 questions Total Time About 75 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 6.3: Group Management Summary In this section students will learn about the following commands used to manage group accounts and group membership: groupadd groupmod groupdel gpasswd newgrp usermod groups Students will learn how to: Create groups and define the group ID. Change secondary group membership for specific user accounts. Enable a group password. Linux+ Objectives: 107.1 Manage user and group accounts and related system files Candidates should be able to add, remove, suspend and change user accounts. o Add, modify and remove users and groups. o Manage user/group info in password/group databases. o Create and manage special purpose and limited accounts. Lecture Focus Questions: Which usermod option changes the secondary group membership? Which command removes all secondary group memberships for specific user accounts? How can you display the primary and secondary group membership for a single user? Which groupmod option changes the name of a group? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo Time 6.3.1 Group Management Commands 4:51 6.3.2 Managing Groups 3:17 Total 8:08 Lab/Activity Rename and Create Groups Add Users to a Group Add a User to Additional Groups Delete a Group and Users Remove a User from a Group Remove a User from All Groups Number of Exam Questions 4 questions Total Time About 45 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 7.1: Disk Partitions Summary This section examines details about managing disk partitions. Concepts covered include: Partition types: o Primary o Extended Tools to create and manage partitions: o fdisk o partprobe The role of device files Common device files: o /dev/sdxn o /dev/cdrom o /dev/fdn o /dev/ttyn o /dev/ttySn o /dev/lpn o /dev/usb/file_name o /dev/psaux o /dev/stn The role of the Logical Volume Manager (LVM) LVM commands: o pvcreate o pvscan o vgcreate o vgextend o lvcreate o lvscan o lvextend Students will learn how to: Use fdisk to view the partition information on the system. Linux+ Objectives: 102.1 Design hard disk layout Candidates should be able to design a disk partitioning scheme for a Linux system. o Allocate filesystems and swap space to separate partitions or disks. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. o Tailor the design to the intended use of the system. o Ensure the /boot partition conforms to the hardware architecture requirements for booting. o Knowledge of basic features of LVM. 104.1 Create partitions and filesystems Candidates should be able to configure disk partitions and then create filesystems on media such as hard disks. This includes the handling of swap partitions. Lecture Focus Questions: Why is it important to plan disk partitioning before installing Linux? What is the difference between a primary and an extended partition? What utility do you use to manage disk partitions? Linux allows a maximum of only four primary partitions on a single hard disk drive. What can you do to get around this limitation? What does /dev/sda3 device file name identify? In what directory are the device file names stored? Video/Demo 7.1.1 Disk Partitions Time 13:03 7.1.2 Managing Partitions 7:32 7.1.3 Viewing Partitions 3:03 7.1.7 Logical Volume Manager (LVM) 7.1.8 Using LVM Total 14:00 5:20 42:58 Lab/Activity View the Partition Table Number of Exam Questions 15 questions Total Time About 70 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 7.2: File Systems Summary This section discusses file systems supported by Linux and how to format a hard disk. Common file systems: o ext2 o ext3 o ext4 o swap o reiserfs o ntfs o vfat o xfs Command used to format a partition: o mkfs o mkreiserfs o mkswap o mke2fs The role of the inode table The role of a superblock Students will learn how to: Format a hard disk with a specified file system. Create and activate a new swap partition. Linux+ Objectives: 104.1 Create partitions and filesystems Candidates should be able to configure disk partitions and then create filesystems on media such as hard disks. This includes the handling of swap partitions. o Use various mkfs commands to set up partitions and create various filesystems such as: ext2/ext3/ext4 xfs reiserfs v3 vfat Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Lecture Focus Questions: How would you make mkfs automatically calculate the size of the data blocks for the file system? What two different commands can you use to create the ReiserFS file system type? How would you create and activate a swap partition? Which file systems provide journaling? What is the difference between the ext3 and ext4 file system types? Video/Demo 7.2.1 File System Creation 7.2.2 Creating a File System Total Time 14:10 7:56 22:06 Lab/Activity Format a Hard Disk with ext3 Format a Hard Disk with ext4 Format a Hard Disk with reiserfs Create a Swap Area Number of Exam Questions 9 questions Total Time About 50 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 7.3: Mounting File Systems Summary This section discusses mounting file systems. Concepts covered include: Files that manage and monitor the mounting of file systems: o /etc./fstab o /etc/mtab o /procs/mounts Commands to manage the mounting of file systems: o mount /dev/device/mountpoint o mount o df o umount Students will learn how to: Mount a volume to a specified directory with a specified file system. Unmount a volume. Mount a DVD drive to a specified directory. Linux+ Objectives: 104.3 Control mounting and unmounting of filesystems Candidates should be able to configure the mounting of a filesystem. o Manually mount and unmount filesystems. o Configure filesystem mounting on bootup. o Configure user mountable removable filesystems. Lecture Focus Questions: What directory contains mount points specifically for external storage devices? What do you need to do to make a USB drive accessible? What happens if you mount a volume to a directory that already contains data? How can you verify that a volume is mounted correctly? What commands can you use to view the devices that are currently mounted? How can you prevent users from mounting an optical media drive? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo 7.3.1 File System Mounting 7.3.2 Mounting a File System Total Time 15:39 4:31 20:10 Lab/Activity Mount a Volume Unmount a Volume Mount a DVD Drive Number of Exam Questions 15 questions Total Time About 55 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 7.4: File System Maintenance Summary This section explores commands to maintain file system integrity: df du lsof fuser fsck e2fsck debugfs dumpe2fs tune2fs xfs_info xfs_metadump Students will learn how to: Use the df and du commands check disk usage. Use the lsof and fuser commands to monitor the file system. Use the fsck command to check and repair the file system Linux+ Objectives: 104.2 Maintain the integrity of filesystems Candidates should be able to maintain a standard filesystem, as well as the extra data associated with a journaling filesystem. o Verify the integrity of filesystems. o Monitor free space and inodes. o Repair simple filesystem problems. Lecture Focus Questions: What utility allows you to view the space available on all mounted file systems? What kinds of information can the lsof utility provide? What action must you perform before using the fsck utility? Which utility converts ext2 file systems to ext3 file systems? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo Time 7.4.1 File System Maintenance 8:26 7.4.2 Maintaining File Systems 7:47 Total 16:13 Lab/Activity Determine the Amount of Free Disk Space Determine the Directory Size Number of Exam Questions 13 questions Total Time About 50 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 7.5: Disk Quotas Summary In this section students will learn about using disk quotas to limit the amount of disk space a user or group can use. Concepts covered include: Quota types: o Soft limit o Hard limit Steps to implement quotas: o Install quota package o Edit mount option in /etc/fstab o Create quota files o Enable quotas and view a quota report o Edit quotas Commands for working with quotas: o quotacheck –mavug o quotaon o quotaoff o repquota o edquota o quota Students will learn how to: Scan the file system and create quota files. Enable quotas on the file system. Create a quota and set the block and inode quotas. Generate a quota report. Linux+ Objectives: 104.4 Manage disk quotas Candidates should be able to manage disk quotas for users. o Set up a disk quota for a filesystem. o Edit, check and generate user quota reports. Lecture Focus Questions: What is the difference between a soft and hard block limit? What is the difference between block quotas and inode quotas? What tool do you use to create the aquota.user and aquota.group files in the file system? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. How would you generate a quota report to display how much space is used by users on the system? Video/Demo 7.5.1 Disk Quotas 7.5.2 Managing Quotas Total Time 8:05 13:36 21:41 Lab/Activity Find the User Quota Generate a Quota Report Turn Quotas On Turn Quotas Off Edit Quotas 1 Edit Quotas 2 Number of Exam Questions 8 questions Total Time About 65 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 7.6: Ownership Summary This section discusses managing file and directory ownership. Concepts covered include: Common commands for managing file ownership: o ls –l o chown o chgrp Students will learn how to: Use the chown command to change file ownership. Change the group ownership of a file. Linux+ Objectives: 104.5 Manage file permissions and ownership Candidates should be able to control file access through the proper use of permissions and ownerships. o Manage access permissions on regular and special files as well as directories. o Use access modes such as suid, sgid and the sticky bit to maintain security. o Know how to change the file creation mask. o Use the group field to grant file access to group members. Lecture Focus Questions: Which user accounts can change file ownership? Which utility will display ownership information for files and directories? What are the two different methods you can use to change group ownership of a file? Video/Demo Time 7.6.1 Ownership 5:23 7.6.2 Managing Ownership 4:52 Total 10:15 Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Lab/Activity View Ownership Information Change File Ownership Change Group Ownership for a File Change Directory Ownership Number of Exam Questions 2 questions Total Time About 35 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 7.7: Permissions Summary This section discusses managing file and directory permissions. Concepts covered include: The role of the file inode Mode sections Types of Permissions contained in the mode o Read o Write o Execute Identifying permissions: o Letter Abbreviation o Octal Number Identifying a file vs. a directory in the mode Common commands for managing permissions o ls –l o chmod The role of the umask Commands for managing umask Special permissions o SUID o SGID o Sticky bit Commands to manage special permissions o ls –l o chmod Students will learn how to: Manage permissions by setting the needed file and directory permissions. Change the umask settings to control access. Set or remove special permissions. Linux+ Objectives: 104.5 Manage file permissions and ownership Candidates should be able to control file access through the proper use of permissions and ownerships. o Manage access permissions on regular and special files as well as directories. o Use access modes such as suid, sgid and the sticky bit to maintain security. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. o Know how to change the file creation mask. o Use the group field to grant file access to group members. Lecture Focus Questions: What is the 'mode of a file'? Which user accounts can change the mode of a file? What permissions does 764 represent when identifying permissions numerically? What does the first dash represent in -rwxrw-r--? What are the default permissions for files and directories? What is the function of umask? What does the umask value represent? In which file should you set the umask value to make it persistent? On which types of files should you configure the SUID and SGID bits? What is the purpose for setting the sticky bit? Which special permissions would be set using chmod 6421? Video/Demo Time 7.7.1 Permissions 15:35 7.7.2 Managing Permissions 14:17 7.7.8 Umask 9:51 7.7.9 Using Umask 9:39 7.7.12 Special Permissions 4:55 7.7.13 Assigning Special File Permissions 7:57 Total 62:14 Lab/Activity Set Directory Permissions Add File Permissions Set File Permissions Enable Directory Browsing Change the Umask Set the SUID Bit Remove SUID and SGID Permissions Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Number of Exam Questions 17 questions Total Time About 120 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 7.8: Archive and Backup Summary This section discusses creating archives to backup data. Concepts covered include: The tar (tape archive) utility o tar o gzip o gunzip o bzip2 The cpio utility The dd utility Students will learn how to: Use tar to create a compressed tar file. Use tar to extract files from a tar file. Use cpio to create an archive file and extract files from the cpio file. Use dd to copy information from records. Linux+ Objectives: 103.3 Perform basic file management Candidates should be able to use the basic Linux commands to manage files and directories. o Usage of tar, cpio and dd. Lecture Focus Questions: What type of file would the file marketing.tar.gz represent? Which tar command option decompresses a file? Which utilities can decompress a file with a .bz2 extension? When would you use the dd command over the cp command to copy information? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo Time 7.8.1 Tar Utility 10:22 7.8.2 Using Tar 4:26 7.8.6 cpio and dd Utility 10:23 7.8.7 Using cpio and dd 8:48 Total 33:59 Lab/Activity Create a Compressed tar File Extract from tar Files Number of Exam Questions 9 questions Total Time About 60 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 8.1: Device Drivers Summary In this section students will learn the basics of device drivers. Concepts covered include: Methods Linux uses to implement device drivers: o Loaded as a kernel module o Compiled into the kernel Directories that contain hardware information: o /proc o /sys Utilities that provide information about hardware configuration: o lsusb o hwinfo o lspci Students will learn how to: View hardware information by viewing the contents of the /proc and /sys directories. View hardware information using the lsusb, hwinfo and lspci utilities. Linux+ Objectives: 101.1 Determine and configure hardware settings Candidates should be able to determine and configure fundamental system hardware. o Enable and disable integrated peripherals o Configure systems with or without external peripherals such as keyboards o Differentiate between the various types of mass storage devices o Set the correct hardware ID for different devices, especially the boot device o Determine hardware resources for devices o Tools and utilities to list various hardware information (e.g., lsusb, lspci, etc.) o Tools and utilities to manipulate USB devices Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Lecture Focus Questions: How are device drivers implemented on a Linux system? Why are some device drivers not compiled into the kernel? Which directories contain information about the hardware that is installed on the computer? How would you use the hwinfo utility to display information about all the hardware in the computer? What extension identifies a kernel module? What type of information is stored in /proc/cmdline? Which utility will display information about the PCI devices on the system? Video/Demo Time 8.1.1 Device Drivers 12:35 8.1.2 Viewing Hardware Information 10:20 Total 22:55 Lab/Activity View /proc Information Number of Exam Questions 9 questions Total Time About 40 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 8.2: Kernel Module Management Summary This section examines managing kernel modules. Concepts covered include: Files to automatically load kernel modules when the system boots: o /etc/modprobe.conf o /etc/modprobe.d Commands to manage kernel modules manually: o lsmod o modinfo o depmod o insmod o modprobe o rmmod Students will learn how to: View a list of currently loaded modules using lsmod. Create a list of module dependencies using depmod. Use modprobe to load a kernel module. Remove a module using rmmod. Linux+ Objectives: 101.1 Determine and configure hardware settings Candidates should be able to determine and configure fundamental system hardware. o Enable and disable integrated peripherals o Configure systems with or without external peripherals such as keyboards o Differentiate between the various types of mass storage devices o Set the correct hardware ID for different devices, especially the boot device o Determine hardware resources for devices Lecture Focus Questions: Which commands can you use to view modules that are currently loaded? How would you generate a list of module dependencies? What is the advantage of using modprobe over insmod to load a module into the kernel? How do you unload a kernel module with its dependencies? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo 8.2.1 Kernel Module Management 8.2.2 Managing Kernel Modules Total Time 13:45 4:29 18:14 Lab/Activity Insert a Module into the Kernel Remove a Module from the Kernel Number of Exam Questions 3 questions Total Time About 35 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 8.3: Hotplug and Coldplug Devices Summary This section provides information about managing Hotplug and Coldplug devices. Concepts covered include: Device categories: o Coldplug o Hotplug Components to manage devices: o sysfs o Hardware Abstraction layer (HAL) daemon o Desktop Bus (D-Bus) daemon o /udev Students will learn how to: View the rules file in /udev/rules. Modify and save a rule. Linux+ Objectives: 101.1 Determine and configure hardware settings Candidates should be able to determine and configure fundamental system hardware. o Know the differences between coldplug and hotplug devices o Conceptual understanding of sysfs, udev, hald, dbus Lecture Focus Questions: What is the difference between a hotplug and a coldplug device? Which types of devices are usually coldplug devices? What is the function of the sysfs virtual file? Where is sysfs located? How does the system recognize when a device is added or removed? Which utility dynamically creates device files as devices are added to the system? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo Time 8.3.1 Hotplug and Coldplug Devices 6:47 8.3.2 Managing udev Rules 3:01 Total 9:48 Number of Exam Questions 4 questions Total Time About 15 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 9.1: Processes Summary This section discusses the basics of processes. Concepts covered include: File types that create processes on a Linux system: o Binary executable o Internal shell commands o Shell scripts Types of processes: o User o Daemon Process identifiers: o Process ID (PID) o Parent Process ID (PPID) Commands to view processes: o top o ps Students will learn how to: Use top to monitor Linux processes. Use ps to troubleshoot a Linux system. Linux+ Objectives: 103.5 Create, monitor and kill processes Candidates should be able to perform basic process management. o Monitor active processes. o Select and sort processes for display. o Send signals to processes. 103.6 Modify process execution priorities Candidates should be able to manage process execution priorities. o Know the default priority of a job that is created. Lecture Focus Questions: Which types of files can create processes on a Linux system? What is the difference between user process and daemon processes? How are system processes usually identified? Which process is always assigned the same process ID number? What is the major difference between how top and ps display system processes? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo 9.1.1 Processes Time 14:15 9.1.3 Process Display 9:37 9.1.4 Viewing Processes 9:21 Total 33:13 Lab/Activity View Process Information Number of Exam Questions 8 questions Total Time About 50 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 9.2: Process Management Summary This section discusses managing and prioritizing processes. Concepts covered include: Commands to move processes between the foreground and background, and adjust process priorities: o command & o jobs o bg o fg o Ctrl+z o nice o renice o nohup & Commands to terminate running processes: o kill o killall o xkill Students will learn how to: Switch a process between the foreground and background. Set and change the priority of a process. Terminate a process using either kill or killall. Scan and kill zombie processes on the system. Linux+ Objectives: 103.5 Create, monitor and kill processes Candidates should be able to perform basic process management. o Run jobs in the foreground and background. o Signal a program to continue running after logout. o Monitor active processes. o Select and sort processes for display. o Send signals to processes. 103.6 Modify process execution priorities Candidates should be able to manage process execution priorities. o Know the default priority of a job that is created. o Run a program with higher or lower priority than the default. o Change the priority of a running process. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Lecture Focus Questions: What is the difference between a process running in the foreground and a process running in the background? Which commands can be used to move processes between the foreground and the background? How can you change the priority of a process? What is the range for nice values? What number would be the highest priority for a nice value? Which termination signal is sent by the Ctrl+c key combination? Which utility changes the cursor to an X to terminate GUI applications? Video/Demo 9.2.1 Process Management Time 12:04 9.2.2 Switching Foreground and Background Processes 4:54 9.2.3 Prioritizing Processes 6:53 9.2.5 Process Termination 5:57 9.2.2 Terminating Processes 3:55 Total 33:43 Lab/Activity Stop a Zombie Process Number of Exam Questions 19 questions Total Time About 60 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 9.3: Task Management Summary This section discusses task management. Details include: The role of the at daemon o Steps to use the at utility o Commands to manage tasks with the at command at time date at time_of_day at now at now + number time_period at –f filename time at -1 atq at –d jobnumber atrm jobnumber The role of the cron daemon The configuration files that cron uses: o /etc/crontab o /etc/cron.timeparameter o /var/spool/cron/username o /etc/cron.allow o /etc/cron.deny Commands to manage cron task scheduling: o crontab o vi /etc/crontab o crontab file o which Students will learn how to: Verify that the atd daemon is running. Schedule a job to run in the future using the at command. View a list of pending jobs using the atq command. Removing a pending job using the atrm command. Linux+ Objectives: 107.2 Automate system administration tasks by scheduling jobs Candidates should be able to use cron or anacron to run jobs at regular intervals and to use at to run jobs at a specific time. o Manage cron and at jobs. o Configure user access to cron and at services. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Lecture Focus Questions: Which script controls the at daemon? Which files control access to the at command? What is the main difference between using at and cron to schedule a job? Which files control access to the cron command? Where is the system wide crontab file located? How can you edit personal crontab files? Video/Demo Time 9.3.1 At Task Scheduling 7:10 9.3.2 Scheduling Tasks with at 4:34 9.3.4 Cron Task Scheduling 9.3.5 Scheduling Tasks with cron Total 12:03 7:12 30:59 Number of Exam Questions 16 questions Total Time About 55 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 9.4: Print Management Summary This section examines managing printers and printing on Linux systems. Concepts covered include: CUPS components: o Client o Server o Scheduler o Queue o Filter o Backend o Postscript Printer Descriptions (PPD) The steps CUPS uses to process print jobs Common parameters in /etc/cups/cupsd.conf configuration file: o ServerName o ServerAdmin o DocumentRoot o LogLevel o Listen o MaxCopies o MaxJobsPerUser o User o Group o MaxClients o Browsing o BrowseAddress o BrowseInterval o BrowseOrder o BrowseAllow o BrowseDeny Utilities used to configure CUPS: o cupsctl o lppasswd –g sys –a root Commands associated with LPD and CUPS: o lpr o lpc o lpq o lprm o lpstat o cancel o lpoptions o accept o reject Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. o disable o cupsdisable o enable o cupsenable Parameters commonly found in the LPD configuration file, /etc/lpd.perms. o DEFAULT o HOST o REMOTEHOST o REMOTIP o REMOTEUSER o SAMEHOST o SAMEUSER o SERVER o SERVICE o USER Students will learn how to: Verify CUPS is installed and running. Configure the CUPS daemon parameters to provide network printing on a Linux system. Enable the printer to allow printer sharing. Use lp commands to manage print jobs at the shell prompt. Linux+ Objectives: 108.4 Manage printers and printing Candidates should be able to manage print queues and user print jobs using CUPS and the LPD compatibility interface. o Basic CUPS configuration (for local and remote printers). o Manage user print queues. o Troubleshoot general printing problems. o Add and remove jobs from configured printer queues. Lecture Focus Questions: What is the function of the cupsd daemon on the server? How can you access the Web-based administration tool for the CUPS server? What is the file used to configure CUPS? Which commands can you use to remove print jobs from the queue? What command is necessary to activate a printer queue? How can you display all the printer queues on the system? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo 9.4.1 Common Unix Print System (CUPS) Operation Time 8:28 9.4.2 CUPS Installation and Configuration 12:57 9.4.3 Configuring a CUPS Printer 11:15 9.4.5 Print Management Commands 5:45 9.4.6 Managing Print Jobs 4:31 Total 42:56 Lab/Activity Print a File Remove a Print Job Number of Exam Questions 17 questions Total Time About 80 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 9.5: Time Management Summary This section discusses the basics of time management. Details include: Time zones Linux clocks: o Hardware clock o System time Local time or Coordinated Universal Time (UTC) time Calculating the UTC offset Tools and files to determine and change time zone settings: o /usr/share/zoneinfo o /etc/localtime o /etc/timezone o /etc/sysconfig/clock o date o tzselect o TZ=time-zone export TZ Files and utilities to manage the hardware clock and system time: o cat /proc/driver/rtc o hwclock o /etc/sysconfig/clock o netdate o date The role of the Network Time Protocol (NTP) Files and utilities to manage time using the NTP: o /etc/ntp.conf o ntpdate o ntpd o rcntp start or service ntpd start o insserv ntp o ntpq o ntptrace Students will learn how to: Change time zone settings and make them permanent. Setting the hardware clock. Create a time synchronization solution using public NTP time providers. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Linux+ Objectives: 107.3 Localization and internationalization Candidates should be able to localize a system in a different language than English. As well, an understanding of why LANG=C is useful when scripting. o Locale settings. o Timezone settings. 108.1 Maintain system time Candidates should be able to properly maintain the system time and synchronize the clock via NTP. o Set the system date and time. o Set the hardware clock to the correct time in UTC. o Configure the correct timezone. o Basic NTP configuration. o Knowledge of using the pool.ntp.org service Lecture Focus Questions: How can you view the current hardware clock time? What does it mean for 'time to drift'? How do you synchronize time on a Linux network? How does stratum help to provide accurate time? What is the difference between stepping and slewing? What happens when the time provider and the time consumer are more than 17 minutes off from each other? Video/Demo 9.5.1 Time Zone Settings Time 10:19 9.5.2 Configuring Time Zone Settings 4:33 9.5.4 Time Maintenance 7:01 9.5.5 Setting the Hardware Clock 8:07 9.5.7 Network Time Protocol (NTP) 15:03 9.5.8 Synchronizing Time with NTP 10:56 Total 55:59 Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Number of Exam Questions 21 questions Total Time About 85 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 9.6: Mail Transfer Agent (MTA) Summary In this section students will explore using Mail Transfer Agents (MTA). Details include: Common MTA types on a Linux system: o Sendmail o Postfix o qmail o Exim To manage messages use: o mail o /etc/aliases.db o ~/.forward o /var/spool/mail Students will learn how to: Send mail to a local user from the command line. Configure an alias for long term redirection of mail. Configure forwarding to another user for a temporary redirection of mail. Linux+ Objectives: 108.3 Mail Transfer Agent (MTA) basics Candidates should be aware of the commonly available MTA programs and be able to perform basic forward and alias configuration on a client host. Other configuration files are not covered. o Create e-mail aliases. o Configure e-mail forwarding. o Knowledge of commonly available MTA programs (postfix, sendmail, qmail, exim) (no configuration) Lecture Focus Questions: What is the role and function of a Mail Transfer Agent (MTA)? What are the most common types of MTAs on a Linux system? How do you read mail for local user accounts from the command line? Why would you configure an alias for the MTA running on a local system? What file do you use to configure forwarding of e-mail messages? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo 9.6.1 MTA Overview Time 11:28 9.6.2 MTA Configuration 8:25 9.6.3 Configuring MTA Settings 8:44 Total 28:37 Number of Exam Questions 13 questions Total Time About 45 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 9.7: Structured Query Language (SQL) Summary This section provides an overview of using Structured Query Language (SQL) in database applications. Details include: Commands used to access and control a MySQL server: o mysql_install_db o mysqladmin o mysql o service mysqld start rcmysql start Database objects: o Database o Table o Record o Attributes o Integers o Primary key Common SQL data types: o Character o Varchar o Decimal o Float o Time o Date o Enum Commands to create, modify and extract data from databases: o CREATE DATABASE o USE o SHOW TABLES o CREATE TABLE o INSERT INTO o DESCRIBE o SELECT o UPDATE o DELETE FROM o ALTER TABLE o DROP TABLE Students will learn how to: Use SQL commands to create a new database and a table within the database. Add data to the table using SQL commands. Use the SELECT command to print data from the database. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Use the DELETE command to delete data from the table. Linux+ Objectives: 105.3 SQL data management Candidates should be able to query databases and manipulate data using basic SQL commands. This objective includes performing queries involving joining of 2 tables and/or subselects. o Use of basic SQL commands. o Perform basic data manipulation. Lecture Focus Questions: What are the components that make up a database? What is the difference between a table record and an attribute? What SQL command would you use to view the data in a database? How can you ensure that you do not delete the wrong data from the database? When would you combine the SELECT and SORT BY commands? Video/Demo Time 9.7.1 SQL Data Management 10:02 9.7.2 Manipulating SQL Data 12:31 Total 22:33 Number of Exam Questions 9 questions Total Time About 35 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 10.1: System Log Files Summary This section examines system logging. Concepts covered include: The role of log files Entry options in the /etc/syslog.conf Common log files The role of the logrotate utility: Commands found in the /etc/logrotate.conf or scripts in /etc/logrotate.d: o compress o maxage o dateext o rotate o size o notifyempty o missingok o create o postrotate Commands to view and manage text-based log files: o cat o grep o tail o head o less o more o vi o gedit Commands to view and manage binary log files: o dmesg o dmesg –n # o last o faillog o lastb o lastlog o logger o logrotate o sar Students will learn how to: Configure a syslog daemon to log to a remote host. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Linux+ Objectives: 108.2 System logging Candidates should be able to configure the syslog daemon. This objective also includes configuring the logging daemon to send log output to a central log server or accept log output as a central log server. o syslog configuration files o syslog o standard facilities, priorities and actions Lecture Focus Questions: What is the role of the syslog daemon? Why is it a good idea to send log message to a remote server? What actions are necessary to configure a server to receive messages from a client? What is the syntax for the entries in the /etc/syslog.conf file? How can you send messages to a virtual console? What is the function of logrotate utility? Where are the entries for the logrotate configuration file stored? What commands can be used to view text-based log files? What command will show all failed login attempts on the system? Video/Demo 10.1.1 Log Files Time 14:22 10.1.2 Configuring Remote Logging 8:24 10.1.5 Logrotate 7:05 10.1.7 Log File Display 9:52 10.1.8 Displaying Log Files 5:17 Total 45:00 Number of Exam Questions 20 questions Total Time About 70 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 10.2: Scripts Summary In this section students will learn about using scripts to execute commands. Details include: The role of scripts Methods to run scripts Simple scripting functions: o Specify the shell that runs the script o Add comments o Add commands o Use variables o Display information on the screen o Get user input o Declare integers or function in the text Script control structures: o Branching structures o Looping structures Commands and statements to create control structures: o Sequences o Testing conditions o If, then, else statements o Case statements o While loops o Until loops o For loops Students will learn how to: Create a simple script to echo text on the screen and run a command. Create a script that will read input from a user. Create a script that will use declared variables as integers to allow math to be performed by the script. Create a script using control structures. Linux+ Objectives: 105.2 Customize or write simple scripts Candidates should be able to customize existing scripts, or write simple new BASH scripts. o Use standard sh syntax (loops, tests). o Use command substitution. o Test return values for success or failure or other information provided by a command. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. o Perform conditional mailing to the superuser. o Correctly select the script interpreter through the shebang (#!) line. o Manage the location, ownership, execution and suid-rights of scripts. Lecture Focus Questions: What lines are required within a shell script? How can you comment out lines in a shell script? Why do you need to assign the execute permission to a script? What methods can you use to run a script from the command line? What command do you use to obtain user input during the execution of a script? Why might you need to use the declare command in a script? Under which conditions would you use an until loop in place of a while loop? How should you end the script containing the if, then, else control structure? Video/Demo 10.2.1 Scripts Overview Time 15:17 10.2.2 Creating Simple Scripts 9:45 10.2.4 Script Control Structure 11:27 10.2.5 Creating Script Control Structures Total 5:32 42:01 Number of Exam Questions 13 questions Total Time About 65 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 10.3: Text Stream Processing Summary This section discusses the processing of a text stream. Details include: Commands to intercept and process the text stream: o cut o expand o fmt o join o nl o od o paste o pr o sed o awk o sort o split o tr o unexpand o uniq o wc Students will learn how to: Use text stream processing to manipulate text using commands that filter and modify the output. Linux+ Objectives: 103.2 Process text streams using filters Candidates should be able to apply filters to text streams. o Send text files and output streams through text utility filters to modify the output using standard UNIX commands found in the GNU textutils package. Lecture Focus Questions: How can text stream processing be used to modify the output of text? What command would you use to remove characters from lines of text in a text stream? How could you format files with long lines to display properly on the monitor? What command would you use to format a text file for printing? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Which commands replace a tab character with a specified number of spaces and vice versa? How can you display a text stream with numbers preceding each line? Video/Demo Time 10.3.1 Text Stream Processing 24:37 10.3.2 Processing Text Streams 17:32 Total 42:09 Number of Exam Questions 20 questions Total Time About 70 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 11.1: Networking Overview Summary This section provides students with an overview of networking. Details include: The role of a protocol Protocols in the IP protocol suite IPv4 address details o 32-bit binary number represented in four octets (four 8-bit numbers) o Subnet mask o Default class o Address classes A B C D E Network Address Translation (NAT) router Subnetting Network address Broadcast address IPv6 address details: o 32 hexadecimal numbers, organized into 8 quartets o 128-bit address contains two parts: Prefix Interface ID The role of ports ICANN specifies three categories for port: o Well known o Registered o Dynamic Ports that correspond to common Internet services Linux+ Objectives: 109.1 Fundamentals of internet protocols Candidates should demonstrate a proper understanding of TCP/IP network fundamentals. o Demonstrate an understanding network masks. o Knowledge of the differences between private and public "dotted quad" IP-Addresses. o Setting a default route. o Knowledge about common TCP and UDP ports (20, 21, 22, 23, 25, 53, 80, 110, 119, 139, 143, 161, 443, 465, 993, 995). Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. o Knowledge about the differences and major features of UDP, TCP and ICMP. o Knowledge of the major differences between IPv4 and IPV6. o Knowledge of the basic features of IPV6. Lecture Focus Questions: What is the function of the IP protocol? What is the difference between a connectionless and a connectionoriented protocol? What is the main role of the ICMP protocol? What is the difference between a private and public IP address? How does the subnet mask identify the network address and network node? What are the differences between IP version 4 and IP version 6 addresses? Which file lists all network services and their ports on the Linux system? Video/Demo Time 11.1.1 IP Protocols 7:33 11.1.3 IP Addresses 8:31 11.1.4 Subnet Masks 6:49 11.1.6 Common Ports 4:02 Total 26:55 Number of Exam Questions 24 questions Total Time About 60 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 11.2: Network Interface Configuration Summary This section discusses configuring network interfaces. Topics covered include: Options for assigning IP addresses o Static (manual assignment) o Dynamic Host Configuration protocol (DHCP) assignment Files used for network configuration: o /etc/init.d/network o /etc/rc.d/init.d/network o /etc/sysconfig/network-scripts o /var/lib/dhcpcd/dhcpclientn o /var/lib/dhcpcd/dhclient.leases Commands for configuring network settings o service network o ifconfig interface parameters o ifup o ifdown o ifconfig o ifconfig interface Students will learn how to: View information about the current network interfaces. Use the interface configuration file to manually assign a static address for the network interface. Disable and enable a network interface. Linux+ Objectives: 109.2 Basic network configuration Candidates should be able to view, change and verify configuration settings on client hosts. o Manually and automatically configure network interfaces o Basic TCP/IP host configuration. Lecture Focus Questions: What is the advantage of using dynamic addressing over static addressing? Where is the interface configuration file located on the system? What is the purpose of the lo network interface? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. How can you view the current status of the network interfaces from the shell prompt? What utilities can disable and enable the network interfaces? Video/Demo 11.2.1 Address Configuration Time 11:56 11.2.2 Viewing and Managing Addresses with ifconfig 5:33 11.2.3 Configuring DHCP and Static Addressing 5:57 Total 23:26 Lab/Activity Start a NIC Stop a NIC Number of Exam Questions 7 questions Total Time About 45 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 11.3: Routing Configuration Summary In this section students will learn about configuring routing. Details include: The role of a router The role of a routing table The role of a default router Commands for configuring routing o route add o route del o route Students will learn how to: Configure a persistent default gateway route in the proper configuration file (dependent upon your Linux distribution). Set the default gateway address. Manually add a route to another network. Delete a route. Linux+ Objectives: 109.1 Fundamentals of internet protocols Candidates should demonstrate a proper understanding of TCP/IP network fundamentals. o Setting a default route. 109.2 Basic network configuration Candidates should be able to view, change and verify configuration settings on client hosts. o Manually and automatically configure network interfaces o Basic TCP/IP host configuration. Lecture Focus Questions: What is the role of a router? What file contains the complete routing table on the system? How would you make the default gateway persistent? Which command sets the default route on the system? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo Time 11.3.1 Routing Configuration 6:02 11.3.2 Configuring the Default Route 7:06 Total 13:08 Number of Exam Questions 7 questions Total Time About 20 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 11.4: Hostname and DNS Configuration Summary This section discusses the files that administrators use to configure DNS settings on Linux: /etc/hosts /etc/resolv.conf /etc/nsswitch.conf /etc/HOSTNAME /etc/sysconfig/network host hostname Students will learn how to: Configure the settings in the hosts file to resolve name resolution on a system. Configure name resolution using the settings in the /etc/resolv.conf file to access a DNS server. Configure the /etc/nsswitch.conf file to define the order in which the name resolution should be completed. Linux+ Objectives: 109.4 Configure client side DNS Candidates should be able to configure DNS on a client host. o Demonstrate the use of DNS on the local system. o Modify the order in which name resolution is done. Lecture Focus Questions: When configuring the DNS, what is the purpose for having multiple nameservers? Which file provides the system with domain names mapped to IP addresses? What function does the /etc/nsswitch.conf file provide? What are the advantages of using a DNS server for name resolution? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo Time 11.4.1 Hostname and DNS Configuration 7:24 11.4.2 Configuring DNS Settings 9:14 Total 16:38 Number of Exam Questions 12 questions Total Time About 30 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 11.5: Network Troubleshooting Summary This section provides the guidelines for troubleshooting network communication problems. Details include: Troubleshooting methodology 1. Identify the symptoms and potential causes. 2. Establish what has changed. 3. Create a hypothesis. 4. Create an action plan and account for side effects of the proposed plan. 5. Implement the fix to the problem, verifying the solution has fixed the problem and not caused any other problems. 6. Ensure user satisfaction. 7. Document the solution and process. Considerations when troubleshooting communications: o Physical issues o Interference o Network issues Tools for troubleshooting network communication problems: o ping o netstat o traceroute o tracepath o nslookup o dig Students will learn how to: Troubleshoot the network by verifying connectivity between hosts within the network. Test the connectivity and show the path between the two devices. Test for name resolution and obtain in-depth information about a domain name. Linux+ Objectives: 109.3 Basic network troubleshooting Candidates should be able to troubleshoot networking issues on client hosts. o Manually and automatically configure network interfaces and routing tables to include adding, starting, stopping, restarting, deleting or reconfiguring network interfaces. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. o Change, view, or configure the routing table and correct an improperly set default route manually. o Debug problems associated with the network configuration. Lecture Focus Questions: Why is it important to completely identify the source of a problem before starting to fix it? What are good sources to research when creating a hypothesis and determining a resolution? After you fix the problem what actions should you still complete? How can you verify the connectivity of hosts within a network? Which utility can display the round trip time of an ICMP echo request? Which utilities send name resolution requests? Which utility will provide the most information about the hostname or IP address? Video/Demo Time 11.5.1 Troubleshooting Methodology 11:11 11.5.3 Network Troubleshooting Tools 13:15 11.5.4 Using Network Troubleshooting Tools Total 7:36 32:02 Number of Exam Questions 16 questions Total Time About 50 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 12.1: Root Usage Summary This section discusses using the root user account to perform tasks. Details include: The role of the root user account Guidelines to protect the root user account The sudo command and /etc/sudoers file Sections used to configure the /etc/sudoers file: o User_Alias o Cmnd_Alias o Host_Alias o Runas_Alias Commands for using the superuser account and switching user: o su o exit o gnomesu o logout o sudo o visudo Students will learn how to: Use su to switch to another user. Start a graphical application from the desktop as a standard user, but gain privileged access. Configure sudo to allow a specific user to complete specific commands with privileged access. Linux+ Objectives: 110.1 Perform security administration tasks Candidates should know how to review system configuration to ensure host security in accordance with local security policies. o Basic sudo configuration and usage. Lecture Focus Questions: Why should you protect the root user password? What utility should you use to the launch the /etc/sudoers file? What is the syntax for the /etc/sudoers file? How can you use su to execute a command without switching into another login console? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. What su option will switch to another user and include the user's environment variables? How does the command prompt appear for a standard user account versus the root user account? Video/Demo 12.1.1 Appropriate Root Usage Time 14:10 12.1.2 Using su 4:09 12.1.3 Configuring sudo 9:59 Total 28:18 Lab/Activity Switch Users for a Command Log Out of the System Number of Exam Questions 7 questions Total Time About 50 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 12.2: User Security and Restriction Summary This section discusses commands used to promote user security and restrictions: chage ulimit Students will learn how to: Configure user password aging limits. Configure the user login restrictions in the /etc/security/limits.conf file. Set limits for programs launched from the shell prompt. Linux+ Objectives: 110.1 Perform security administration tasks Candidates should know how to review system configuration to ensure host security in accordance with local security policies. o Set or change user passwords and password aging information. o Set up limits on user logins, processes and memory usage. Lecture Focus Questions: What are the characteristics of a secure or strong password? Which chage option sets the minimum number of days a user must keep a password? What types of resources are affected by the ulimit utility? When would you need to configure the /etc/security/limits.conf file? What is the syntax of the /etc/security/limits.conf file? Video/Demo Time 12.2.1 User Security and Restriction 9:53 12.2.2 Configuring User Security and Restrictions 6:40 Total 16:33 Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Number of Exam Questions 8 questions Total Time About 30 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 12.3: Network Security Summary This section explores general procedures for increasing network security on a Linux system: Remove unneeded software Check for unneeded network services Locate open ports Check network connections Students will learn how to: Scan for open ports on Linux. Identify open network connections on Linux. Linux+ Objectives: 110.1 Perform security administration tasks Candidates should know how to review system configuration to ensure host security in accordance with local security policies. o Being able to use nmap and netstat to discover open ports on a system. Lecture Focus Questions: What is a socket? Which utility will scan for all listening and non-listening sockets? Which utility will identify open ports on the Linux system? Which commands should you use to disable unneeded daemons? Video/Demo Time 12.3.1 Network Security 7:10 12.3.2 Removing Unneeded Services and Scanning Ports 6:29 Total 13:39 Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Number of Exam Questions 4 questions Total Time About 20 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 12.4: File Auditing Summary This section examines using file auditing to secure the computer by looking for files that pose a security risk. Details include: Types of files that file auditing identifies: o Files that have the SUID (Set User ID) permission. o Files that have the write and execute permissions for others. File auditing commands: o find / type f –perm o crontab Students will learn how to: Audit a system to identify files that are owned by root and have the SUID permission set. Linux+ Objectives: 110.1 Perform security administration tasks Candidates should know how to review system configuration to ensure host security in accordance with local security policies. o Audit a system to find files with the suid/sgid bit set. Lecture Focus Questions: How do files with the SUID bit pose a security risk? Which command should you use to audit for files with the SUID bit set? How can you schedule file auditing? Video/Demo Time 12.4.1 File Auditing 5:00 12.4.2 Auditing Files 3:06 Total 8:06 Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Number of Exam Questions 2 questions Total Time About 10 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 12.5: Login Blocking Summary This section provides information about blocking users from logging in while resolving serious issues. Concepts covered include: Login blocking is enabled using the Pluggable Authentication Modules (PAM) Steps to configure login blocking: o Force all user to log out of the system o Disable the ability to login to the system o Configure the PAM module to verify whether the file /etc/nologin exists Students will learn how to: Disable logins and optionally display a message if a user tries to login. Linux+ Objectives: 110.2 Setup host security Candidates should know how to set up a basic level of host security. o Awareness of shadow passwords and how they work. o Turn off network services not in use. o Understand the role of TCP wrappers. Lecture Focus Questions: What command displays all active users on the Linux system/? What utility should you use to remove active users? Which file configures login blocking? How can you display a message to users when logins are blocked? Which PAM module file configures login blocking? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo Time 12.5.1 Login Blocking 5:10 12.5.2 Disabling Login 3:08 Total 8:18 Number of Exam Questions 3 questions Total Time About 15 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 12.6: Xinetd and Inetd Super Daemons Summary This section provides an overview of the Xinetd and Inetd super daemons. Concepts covered include: The role of Xinetd Files to configure the xinetd super daemon: o /etc/xinetd.conf o /etc/xinetd.d The role of TCP wrappers To use TCP wrapper with xinetd: o Install/Verify the TCP wrappers package is installed o Edit the daemon files in /etc/xinet.d o Restart xinetd o Modify tcpd control files o Confirm TCP wrapper configuration The role of inetd Configuration parameters in the /etc/inetd.conf configuration file: o Daemon o Socket o Protocol o Flag o User o Executable o Arguments Students will learn how to: Configure the superdaemon, xinetd, to manage network and Internet services. Configure access control to daemons using TCP wrappers. Linux+ Objectives: 110.2 Setup host security Candidates should know how to set up a basic level of host security. o Awareness of shadow passwords and how they work. o Turn off network services not in use. o Understand the role of TCP wrappers. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Lecture Focus Questions: Why is xinetd called a super daemon? When should you use TCP wrappers? Which types of files are stored in the /etc/xinetd.d directory? Which file configures the xinetd daemon? When should you use the /etc/host.allow or /etc/host.deny files? Which utility confirms the TCP wrapper configuration? Why is inetd no longer a commonly-used super daemon? How do you configure the inetd daemon? What is the syntax of the /etc/inetd.conf configuration file? Video/Demo 12.6.1 Xinetd and Inetd Super Daemons Time 12:37 12.6.2 Configuring xinetd and TCP Wrappers 8:04 12.6.4 Inetd 6:56 Total 27:37 Number of Exam Questions 14 questions Total Time About 45 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 12.7: OpenSSH Summary This section discusses configuring OpenSSH to encrypt network traffic over a subnet or Internet. Details include: Encryption types: o Symmetric o Asymmetric Standards for symmetric encryption: o Data Encryption Standard (DES) o Triple DES (3DES) o Advanced Encryption Standard (AES) o Blowfish Standards for asymmetric encryption: o Rivest, Shamir Adleman (RSA) o Digital Signature Algorithm (DSA) o Diffie-Hellman Key Exchange The role of OpenSSH Types of SSH o SSH1 is an older, less secure version of SSH. o SSH2 is the current standard SSH implementation. Steps to establish a session using SSH Using OpenSSH configuration files to configure o SSH server o SSH clients o Firewall Configuration files that OpenSSH uses: o /etc/ssh/sshd_config o /etc/ssh/ssh_config o ~/.ssh/config Commands used in conjunction with SSH: o which o service sshd o ssh o scp o sftp o slogin Students will learn how to: Create an encrypted connection between two Linux systems. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Linux+ Objectives: 110.3 Securing data with encryption The candidate should be able to use public key techniques to secure data and communication. o Perform basic OpenSSH 2 client configuration and usage. o Understand the role of OpenSSH 2 server host keys o Perform basic GnuPG configuration and usage. o Understand SSH port tunnels (including X11 tunnels). Lecture Focus Questions: What are the differences between symmetric and asymmetric encryption? When would you use the Diffie-Hellman Key Exchange encryption standard? Which encryption standards are supported by SSH1 versus SSH2? Where does a client store public keys it has received from SSH servers? Which keys are sent to the client when establishing an SSH session? Which file should you edit to configure the SSH daemon on the server? Which file overrides the client's SSH configuration on a per-user basis? What ssh command would you use to log in to a server, execute a command, and return to the local system's shell prompt? Which utility secure copies files and encryption keys? Video/Demo Time 12.7.1 OpenSSH 12:07 12.7.2 OpenSSH Configuration 15:21 12.7.5 Configuring OpenSSH Total 9:37 37:05 Number of Exam Questions 10 questions Total Time About 55 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 12.8: SSH Port Tunneling Summary This section provides an overview of using SSH port tunneling to encrypt data from non-secure protocols before sending the data over a network. Details include: The role of Secure Shell (SSH) port tunneling Commonly-needed options in the /etc/ssh/sshd_config file used for configuring an SSH server: o AllowTcpForwarding o ForwardX11 o ForwardX11Trusted o X11Forwarding Commands to create an SSH port tunnel: o ssh o ss –X Commands to send unencrypted X server traffic between a client and server: o xhost +servername o DISPLAY=hotst_name:0.0 o Export DISPLAY Students will learn how to: Configure SSH port tunneling to send unencrypted network traffic through an encrypted SSH connection. Linux+ Objectives: 110.3 Securing data with encryption The candidate should be able to use public key techniques to secure data and communication. o Understand SSH port tunnels (including X11 tunnels). Lecture Focus Questions: What is the benefit to tunneling traffic through an SSH connection? Which file on the server configures SSH port tunneling? Which ssh command should you use to tunnel X server traffic? How can you send unencrypted X server traffic between a client and server? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo 12.8.1 SSH Port Tunneling 12.8.2 Configuring SSH Port Tunneling Total Time 11:45 2:30 14:15 Number of Exam Questions 2 questions Total Time About 20 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 12.9: Public Key Authentication Summary In this section students will learn about using a public key to authenticate to a computer. Concepts covered include: The public key authentication process Commands and files for public key management: o /etc/ssh/sshd_config o ssh-keygen o scp o ssh o cat o ssh-agent bash o ssh-add Students will learn how to: Configure public key authentication between two systems. Linux+ Objectives: 110.3 Securing data with encryption The candidate should be able to use public key techniques to secure data and communication. o Perform basic OpenSSH 2 client configuration and usage. o Understand the role of OpenSSH 2 server host keys o Understand SSH port tunnels (including X11 tunnels). Lecture Focus Questions: What is an MD5 checksum, and how is it used in public key authentication? Which file configures the server to accept public key authentication? Which keys are generated by the ssh-keygen command when no options are specified? Which utility should you use to copy encryption keys between Linux systems? When is the ~/authorized_keys file used? How can you configure a client to automatically provide the private key passphrase when establishing an SSH session? Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Video/Demo 12.9.1 Public Key Authentication 12.9.2 Configuring Public Key Authentication Total Time 11:47 5:49 17:36 Number of Exam Questions 3 questions Total Time About 25 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Section 12.10: Gnu Privacy Guard (GnuPG) Summary This section examines information about using the Gnu Privacy Guard (GPG) encryption tool. Details include: Commands and files to be aware of when using GPG: o which gpg o gpg Students will learn how to: Use gpg to create a key pair and use the public key to encrypt and decrypt a file. Linux+ Objectives: 110.3 Securing data with encryption The candidate should be able to use public key techniques to secure data and communication. o Perform basic GnuPG configuration, usage, and revocation. Lecture Focus Questions: What is the benefit of using Gnu Privacy Guard (GPG)? What command should you use to determine if GPG is installed on the Linux system? What gpg option will digitally sign a file? How can you display all the GPG keys on the key ring? Video/Demo 12.10.1 GnuPG 12.10.2 Configuring GnuPG Total Time 7:21 21:04 28:25 Number of Exam Questions 4 questions Total Time About 35 minutes Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Practice Exams Summary This section provides information to help prepare students to take the following exams and to register for the exams. LX0-101 LX0-102 Students will also have the opportunity of testing their mastery of the concepts presented in this course to reaffirm that they are ready for the certification exams. For example, all questions that apply to Objective 101: System Architecture are grouped together and presented in practice exam Domain 1: System Architecture, All Questions. Students will typically take about 60-90 minutes to complete each of the following practice exams. The domains included in the LX0-101exam are: Domain 1: System Architecture, All Questions (56 questions) Domain 2: Linux Installation and Package Management, All Questions (80 questions) Domain 3: GNU and Unix Commands, All Questions (129 questions) Domain 4: Devices, Linux Filesystems, Filesystem Hierarchy Standard, All Questions (90 questions) The domains included in the LX0-102 exam are: Domain 5: Shells, Scripting and Data Management, All Questions (36 questions) Domain 6: User Interfaces and Desktops, All Questions (28 questions) Domain 7: Administrative Tasks, All Questions (52 questions) Domain 8: Essential System Services, All Questions (62 questions) Domain 9: Networking Fundamentals, All Questions (83 questions) Domain 10: Security, All Questions (62 questions) The LX0-101 Certification Practice Exam and LX0-102 Certification Practice Exam each consist of 60 questions that are randomly selected from the above practice exams. Each time a Certification Practice Exam is accessed different questions may be presented. Each Certification Practice Exam has a time limit of 90 minutes -- just like the real certification exam. A passing score of 95% should verify that the student has mastered the concepts and is ready to take the real certification exams. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Appendix A: Approximate Time for the Course The total time for the LabSim for CompTIA’s Linux+ Powered by LPI course is approximately 64 hours and 48 minutes. The time is calculated by adding the approximate time for each section which is calculated using the following elements: Video/demo times Approximate time to read the text lesson (the length of each text lesson is taken into consideration) Simulations (5 minutes assigned per simulation) Questions (1 minute per question) The breakdown for this course is as follows: Module Sections Time Total HR:MM 20 20 :20 75 40 45 15 55 45 60 70 35 30 65 535 8:55 35 30 25 90 1:30 0.0 Introduction 0.1 Introduction 1.0 Using Linux 1.1 The Shell 1.2 Help 1.3 Environment Variables 1.4 Aliases 1.5 Text Editors 1.6 Redirection and Piping 1.7 Directories 1.8 Files 1.9 Links 1.10 Filesystem Hierarchy Standard (FHS) 1.11 Locating and Searching Files 2.0 Installation and Localization 2.1 Installation Design 2.2 Linux Installation 2.3 Localization 3.0 Boot and Shutdown 3.1 Linux Boot Process 3.2 BootLoaders 3.3 Runlevels 20 80 45 Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. 3.4 Init Scripts 3.5 System Shutdown 95 35 275 4:35 55 45 35 135 2:15 80 40 25 145 2:25 50 80 45 175 2:55 70 50 55 45 65 35 120 60 500 8:20 40 35 15 90 1:30 50 60 55 80 90 45 35 415 6:55 4.0 User Interfaces and Desktops 4.1 X Window System 4.2 Display Managers 4.3 Accessibility 5.0 Software Installation 5.1 Red Hat Package Manager (RPM) 5.2 Debian Package Manager (DPKG) 5.3 Shared Libraries 6.0 Users and Groups 6.1 User and Group Overview 6.2 User Management 6.3 Group Management 7.0 Disk and File System Management 7.1 Disk Partitions 7.2 File Systems 7.3 Mounting File System 7.4 File System Maintenance 7.5 Disk Quotas 7.6 Ownership 7.7 Permissions 7.8 Archive and Backup 8.0 Hardware Installation 8.1 Device Drivers 8.2 Kernel Module Management 8.3 Hotplug and Coldplug Devices 9.0 Processes and system Services 9.1 Processes 9.2 Process Management 9.3 Task Management 9.4 Print Management 9.5 Time Management 9.6 Mail Transfer Agent (MTA) 9.7 Structured Query Language (SQL) Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. 10.0 System Monitoring 10.1 System Log Files 10.2 Scripts 10.3 Text Stream Processing 75 65 70 210 3:30 60 45 20 30 50 205 3:25 50 30 20 10 15 50 60 20 25 35 315 5:15 11.0 Networking 11.1 Networking Overview 11.2 Network Interface Configuration 11.3 Routing Configuration 11.4 Hostname and DNS Configuration 11.5 Network Troubleshooting 12.0 Security 12.1 Root Usage 12.2 User Security and Restriction 12.3 Network Security 12.4 File Auditing 12.5 Login Blocking 12.6 Xinetd and Inetd Super Daemons 12.7 OpenSSH 12.8 SSH Port Tunneling 12.9 Public Key Authentication 12.10 Gnu Privacy Guard (GnuPG) Practice Exams Domain 1: System Architecture (56 questions) 56 Domain 2: Linux Installation and Package Management (80 questions) 80 Domain 3: GNU and Unix Commands (129 questions) Domain 4: Devices, Linux Filesystem, Filesystem Hierarchy Standard (90 questions) LX0-101 Certification Practice Exam Domain 5: Shells, Scripting and Data Management (36 questions) Domain 6: User Interfaces and Desktops (28 questions) Domain 7: Administrative Tasks (52 questions) 129 90 60 36 28 52 Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Domain 8: Essential System Services (62 questions) 62 Domain 9: Networking Fundamentals (83 questions) Domain 10: Security (60 questions) LX0-102 Certification Practice Exam 83 62 60 Total Time 798 13:18 3888 64:48 Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Appendix B: LabSim for CompTIA’s Linux+ Powered by LPI Changes Instructors who have taught the previous Linux+ version of this course may find the following information valuable. This report details all the changes that were made from the previous course such as: A new video, demo, simulation or text that has been created A video, demo or text that has been updated New questions that have been added to a section A new section that has been added to a module Section and Topic 3.2 GRUB2 3.4 Upstart and Systemd 7.1 LVM 7.2 File Systems 12.10 GnuPG LX0-101 Practice Exams LX0-102 Practice Exams Index 3.2.6 3.2.7 3.2.8 3.2.9 3.4.7 3.4.8 3.4.9 3.4.10 7.1.7 7.1.8 7.1.9 7.1.10 7.2.1 7.2.2 7.2.3 7.2.5 7.2.8 12.10.2 12.10.3 12.10.4 Resource and Change Video (New) Demo (New) Text Lesson (New) Section Quiz (Updated) Video (New) Demo (New) Text Lesson (New) Section Quiz (Updated) Video (New) Demo (New) Text Lesson (New) Section Quiz (Updated) Video (Updated) Demo (Updated) Text Lesson (Updated) Simulation (New) Section Quiz (Updated) Demo (Updated) Text Lesson (Updated) Section Quiz (Updated) Domain pools and Practice Exam (Updated) Domain pools and Practice Exam (Updated) Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Appendix B: Linux+ Powered BY LPI Exams: LX0-101 and LX0-102 Exam Objectives The Linux+ Powered by LPI Exam: LX0-101 and LX0-102 exams cover the following topics (version 3.5.0). # LX0-101 Exam Objectives Module.Section 101 System Architecture 101.1 Determine and configure hardware settings Candidates should be able to determine and configure fundamental system hardware. 8.1 8.2 8.3 Enable and disable integrated peripherals Configure systems with or without external peripherals such as keyboards Differentiate between the various types of mass storage devices Set the correct hardware ID for different devices, especially the boot device Know the differences between coldplug and hotplug devices Determine hardware resources for devices Tools and utilities to list various hardware information (e.g. lsusb, lspci, etc.) Tools and utilities to manipulate USB devices Conceptual understanding of sysfs, udev, hald, dbus The following is a partial list of the used files, terms, and utilities: /sys /proc /dev modprobe lsmod lspci lsusb 101.2 Boot the system Candidates should be able to guide the system through the booting process. 3.1 3.3 Provide common commands to the boot loader and options to the kernel at boot time Demonstrate knowledge of the boot sequence from BIOS to boot completion Check boot events in the log file The following is a partial list of the used files, terms and utilities: Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. /var/log/messages dmesg BIOS bootloader kernel init 101.3 Change runlevels and shutdown or reboot system Candidates should be able to manage the runlevel of the system. This objective includes changing to single user mode, shutdown or rebooting the system. Candidates should be able to alert users before switching runlevel and properly terminate processes. This objective also includes setting the default runlevel. 3.3 3.4 3.5 Set the default runlevel. Change between run levels including single user mode. Shutdown and reboot from the command line. Alert users before switching runlevels or other major system event. Properly terminate processes. Knowledge of basic features of systemd and Upstart. The following is a partial list of the used files, terms and utilities: /etc/inittab shutdown init /etc/init.d telinit 102 Linux Installation and Package Management 102.1 Design hard disk layout Candidates should be able to design a disk partitioning scheme for a Linux system. 2.1 2.2 7.1 Allocate filesystems and swap space to separate partitions or disks. Tailor the design to the intended use of the system. Ensure the /boot partition conforms to the hardware architecture requirements for booting. Knowledge of basic features of LVM. The following is a partial list of the used files, terms and utilities: / (root) filesystem /var filesystem /home filesystem swap space mount points Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. partitions 102.2 Install a boot manager Candidates should be able to select, install and configure a boot manager. 3.2 Providing alternative boot locations and backup boot options. Install and configure a boot loader such as GRUB Legacy. Perform basic configuration changes for GRUB 2. Interact with the boot loader. The following is a partial list of the used files, terms and utilities: /boot/grub/menu.lst, grub.cfg and other variations. grub-install MBR superblock 102.3 Manage shared libraries Candidates should be able to determine the shared libraries that executable programs depend on and install them when necessary. 5.3 Identify shared libraries. Identify the typical locations of system libraries. Load shared libraries. The following is a partial list of the used files, terms and utilities: ldd ldconfig /etc/ld.so.conf LD_LIBRARY_PATH 102.4 Use Debian package management Candidates should be able to perform package management using the Debian package tools. 5.2 Install, upgrade and uninstall Debian binary packages. Find packages containing specific files or libraries which may or may not be installed. Obtain package information like version, content, dependencies, package integrity and installation status (whether or not the package is installed). The following is a partial list of the used files, terms and utilities: /etc/apt/sources.list dpkg dpkg-reconfigure Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. apt-get apt-cache aptitude 102.5 Use RPM and YUM package management Candidates should be able to perform package management using RPM and YUM tools. 5.1 Install, re-install, upgrade and remove packages using RPM and YUM. Obtain information on RPM packages such as version, status, dependencies, integrity and signatures. Determine what files a package provides, as well as find which package a specific file comes from. The following is a partial list of the used files, terms and utilities: rpm rpm2cpio /etc/yum.conf /etc/yum.repos.d/ yum yumdownloader 103 GNU and Unix Commands 103.1 Work on the command line Candidates should be able to interact with shells and commands using the command line. The objective assumes the bash shell. 1.1 1.2 1.3 Use single shell commands and one line command sequences to perform basic tasks on the command line. Use and modify the shell environment including defining, referencing and exporting environment variables. Use and edit command history. Invoke commands inside and outside the defined path. The following is a partial list of the used files, terms and utilities: . bash echo env exec export pwd set unset man uname Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. history 103.2 Process text streams using filters Candidates should be able to apply filters to text streams. 10.3 Send text files and output streams through text utility filters to modify the output using standard UNIX commands found in the GNU textutils package. The following is a partial list of the used files, terms and utilities: cat cut expand fmt head od join nl paste pr sed sort split tail tr unexpand uniq wc 103.3 Perform basic file management Candidates should be able to use the basic Linux commands to manage files and directories. 1.7 1.8 7.8 Copy, move and remove files and directories individually. Copy multiple files and directories recursively. Remove files and directories recursively. Use simple and advanced wildcard specifications in commands. Using find to locate and act on files based on type, size, or time. Usage of tar, cpio and dd. The following is a partial list of the used files, terms and utilities: cp find mkdir mv ls Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. rm rmdir touch tar cpio dd file gzip gunzip bzip2 file globbing 103.4 Use streams, pipes and redirects Candidates should be able to redirect streams and connect them in order to efficiently process textual data. Tasks include redirecting standard input, standard output and standard error, piping the output of one command to the input of another command, using the output of one command as arguments to another command and sending output to both stdout and a file. 1.6 Redirecting standard input, standard output and standard error. Pipe the output of one command to the input of another command. Use the output of one command as arguments to another command. Send output to both stdout and a file. The following is a partial list of the used files, terms and utilities: tee xargs 103.5 Create, monitor and kill processes Candidates should be able to perform basic process management. 9.1 9.2 Run jobs in the foreground and background. Signal a program to continue running after logout. Monitor active processes. Select and sort processes for display. Send signals to processes. The following is a partial list of the used files, terms and utilities: & bg fg jobs kill nohup ps Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. top free uptime killall 103.6 Modify process execution priorities Candidates should be able to manage process execution priorities. 9.1 9.2 Know the default priority of a job that is created. Run a program with higher or lower priority than the default. Change the priority of a running process. The following is a partial list of the used files, terms and utilities: nice ps renice top 103.7 Search text files using regular expressions Candidates should be able to manipulate files and text data using regular expressions. This objective includes creating simple regular expressions containing several notational elements. It also includes using regular expression tools to perform searches through a filesystem or file content. 1.11 Create simple regular expressions containing several notational elements. Use regular expression tools to perform searches through a filesystem or file content. The following is a partial list of the used files, terms and utilities: grep egrep fgrep sed regex(7) 103.8 Perform basic file editing operations using vi Candidates should be able to edit text files using vi. This objective includes vi navigation, basic vi modes, inserting, editing, deleting, copying and finding text. 1.5 Navigate a document using vi. Use basic vi modes. Insert, edit, delete, copy and find text. The following is a partial list of the used files, terms and utilities: Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. vi /, ? h,j,k,l i, o, a c, d, p, y, dd, yy ZZ, :w!, :q!, :e! Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. 104 Devices, Linux Filesystems, Filesystem Hierarchy Standard 104.1 Create partitions and filesystems 7.1 Candidates should be able to configure disk partitions and then create filesystems on 7.2 media such as hard disks. This includes the handling of swap partitions. Use various mkfs commands to set up partitions and create various filesystems such as: o ext2/ext3/ext4 o xfs o reiserfs v3 o vfat The following is a partial list of the used files, terms and utilities: fdisk mkfs mkswap 104.2 Maintain the integrity of filesystems Candidates should be able to maintain a standard filesystem, as well as the extra data associated with a journaling filesystem. 7.4 Verify the integrity of filesystems. Monitor free space and inodes. Repair simple filesystem problems. The following is a partial list of the used files, terms and utilities: du df fsck e2fsck mke2fs debugfs dumpe2fs tune2fs xfs tools (such as xfs_metadump and xfs_info) 104.3 Control mounting and unmounting of filesystems Candidates should be able to configure the mounting of a filesystem. 7.3 Manually mount and unmount filesystems. Configure filesystem mounting on bootup. Configure user mountable removable filesystems. The following is a partial list of the used files, terms and utilities: /etc/fstab /media mount Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. umount 104.4 Manage disk quotas Candidates should be able to manage disk quotas for users. 7.5 Set up a disk quota for a filesystem. Edit, check and generate user quota reports. The following is a partial list of the used files, terms and utilities: quota edquota repquota quotaon 104.5 Manage file permissions and ownership Candidates should be able to control file access through the proper use of permissions and ownerships. 7.6 7.7 Manage access permissions on regular and special files as well as directories. Use access modes such as suid, sgid and the sticky bit to maintain security. Know how to change the file creation mask. Use the group field to grant file access to group members. The following is a partial list of the used files, terms and utilities: chmod umask chown chgrp 104.6 Create and change hard and symbolic links Candidates should be able to create and manage hard and symbolic links to a file. 1.9 Create links. Identify hard and/or softlinks. Copying versus linking files. Use links to support system administration tasks. The following is a partial list of the used files, terms and utilities: ln Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. 104.7 Find system files and place files in the correct location Candidates should be thoroughly familiar with the Filesystem Hierarchy Standard (FHS), including typical file locations and directory classifications. 1.10 1.11 Understand the correct locations of files under the FHS. Find files and commands on a Linux system. Know the location and purpose of important files and directories as defined in the FHS. The following is a partial list of the used files, terms and utilities: # find locate updatedb whereis which type /etc/updatedb.conf LX0-102 Exam Objectives Module.Section 105 Shells, Scripting, and Data Management 105.1 Customize and use the shell environment Candidates should be able to customize shell environments to meet users' needs. Candidates should be able to modify global and user profiles. 1.1 1.3 1.4 Set environment variables (e.g. PATH) at login or when spawning a new shell. Write BASH functions for frequently used sequences of commands. Maintain skeleton directories for new user accounts. Set command search path with the proper directory. The following is a partial list of the used files, terms and utilities: /etc/profile env export set unset ~/.bash_profile ~/.bash_login ~/.profile ~/.bashrc ~/.bash_logout function alias lists Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. 105.2 Customize or write simple scripts Candidates should be able to customize existing scripts, or write simple new BASH scripts. 10.2 Use standard sh syntax (loops, tests). Use command substitution. Test return values for success or failure or other information provided by a command. Perform conditional mailing to the superuser. Correctly select the script interpreter through the shebang (#!) line. Manage the location, ownership, execution and suid-rights of scripts. The following is a partial list of the used files, terms and utilities: for while test if read seq 105.3 SQL data management Candidates should be able to query databases and manipulate data using basic SQL commands. This objective includes performing queries involving joining of 2 tables and/or subselects. 9.7 Use of basic SQL commands. Perform basic data manipulation. The following is a partial list of the used files, terms and utilities: insert update select delete from where group by order by join 106 User Interfaces and Desktops 106.1 Install and configure X11 Candidates should be able to install and configure X11. 4.1 Verify that the video card and monitor are supported by an X server. Awareness of the X font server. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Basic understanding and knowledge of the X Window configuration file. The following is a partial list of the used files, terms and utilities: /etc/X11/xorg.conf xhost DISPLAY xwininfo xdpyinfo X 106.2 Setup a display manager Candidates should be able setup and customize a display manager. This objective covers the display managers XDM (X Display Manger), GDM (Gnome Display Manager) and KDM (KDE Display Manager). 4.2 Turn the display manager on or off. Change the display manager greeting. Change default color depth for the display manager. Configure display managers for use by X-stations. The following is a partial list of the used files, terms and utilities: /etc/inittab xdm configuration files kdm configuration files gdm configuration files 106.3 Accessibility Demonstrate knowledge and awareness of accessibility technologies. 4.3 Keyboard Accessibility Settings (AccessX) Visual Settings and Themes Assistive Technology (ATs) The following is a partial list of the used files, terms and utilities: Sticky/Repeat Keys Slow/Bounce/Toggle Keys Mouse Keys High Contrast/Large Print Desktop Themes Screen Reader Braille Display Screen Magnifier On-Screen Keyboard Gestures (used at login, for example gdm) Orca GOK Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. emacspeak 107 Administrative Tasks 107.1 Manage user and group accounts and related system files Candidates should be able to add, remove, suspend and change user accounts. 6.1 6.2 6.3 Add, modify and remove users and groups. Manage user/group info in password/group databases. Create and manage special purpose and limited accounts. The following is a partial list of the used files, terms and utilities: /etc/passwd /etc/shadow /etc/group /etc/skel chage groupadd groupdel groupmod passwd useradd userdel usermod 107.2 Automate system administration tasks by scheduling jobs Candidates should be able to use cron or anacron to run jobs at regular intervals and to use at to run jobs at a specific time. 9.3 Manage cron and at jobs. Configure user access to cron and at services. The following is a partial list of the used files, terms and utilities: /etc/cron.{d,daily,hourly,monthly,weekly} /etc/at.deny /etc/at.allow /etc/crontab /etc/cron.allow /etc/cron.deny /var/spool/cron/* crontab at atq atrm Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. 107.3 Localization and internationalization Candidates should be able to localize a system in a different language than English. As well, an understanding of why LANG=C is useful when scripting. 2.3 9.5 Locale settings. Timezone settings. The following is a partial list of the used files, terms and utilities: /etc/timezone /etc/localtime /usr/share/zoneinfo Environment variables: o LC_* o LC_ALL o LANG /usr/bin/locale tzselect tzconfig date iconv UTF-8 ISO-8859 ASCII Unicode 108 Essential System Services 108.1 Maintain system time 9.5 Candidates should be able to properly maintain the system time and synchronize the clock via NTP. Set the system date and time. Set the hardware clock to the correct time in UTC. Configure the correct timezone. Basic NTP configuration. Knowledge of using the pool.ntp.org service The following is a partial list of the used files, terms and utilities: /usr/share/zoneinfo /etc/timezone /etc/localtime /etc/ntp.conf date hwclock ntpd ntpdate pool.ntp.org Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. 108.2 System logging Candidates should be able to configure the syslog daemon. This objective also includes configuring the logging daemon to send log output to a central log server or accept log output as a central log server. 10.1 syslog configuration files syslog standard facilities, priorities and actions The following is a partial list of the used files, terms and utilities: syslog.conf syslogd klogd logger 108.3 Mail Transfer Agent (MTA) basics 9.6 Candidates should be aware of the commonly available MTA programs and be able to perform basic forward and alias configuration on a client host. Other configuration files are not covered. Create e-mail aliases. Configure e-mail forwarding. Knowledge of commonly available MTA programs (postfix, sendmail, qmail, exim) (no configuration) The following is a partial list of the used files, terms and utilities: ~/.forward sendmail emulation layer commands newaliases mail mailq postfix sendmail exim qmail 108.4 Manage printers and printing Candidates should be able to manage print queues and user print jobs using CUPS and the LPD compatibility interface. 9.4 Basic CUPS configuration (for local and remote printers). Manage user print queues. Troubleshoot general printing problems. Add and remove jobs from configured printer queues. The following is a partial list of the used files, terms and utilities: CUPS configuration files, tools and utilities Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. /etc/cups lpd legacy interface (lpr, lprm, lpq) 109 Networking Fundamentals 109.1 Fundamentals of internet protocols Candidates should demonstrate a proper understanding of TCP/IP network fundamentals. 11.1 11.3 Demonstrate an understanding network masks. Knowledge of the differences between private and public "dotted quad" IPAddresses. Setting a default route. Knowledge about common TCP and UDP ports (20, 21, 22, 23, 25, 53, 80, 110, 119, 139, 143, 161, 443, 465, 993, 995). Knowledge about the differences and major features of UDP, TCP and ICMP. Knowledge of the major differences between IPv4 and IPV6. Knowledge of the basic features of IPv6. The following is a partial list of the used files, terms and utilities: /etc/services ftp telnet host ping dig traceroute tracepath 109.2 Basic network configuration Candidates should be able to view, change and verify configuration settings on client hosts. 11.2 11.3 Manually and automatically configure network interfaces Basic TCP/IP host configuration. The following is a partial list of the used files, terms and utilities: /etc/hostname /etc/hosts /etc/resolv.conf /etc/nsswitch.conf ifconfig ifup ifdown route ping Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. 109.3 Basic network troubleshooting Candidates should be able to troubleshoot networking issues on client hosts. 11.5 Manually and automatically configure network interfaces and routing tables to include adding, starting, stopping, restarting, deleting or reconfiguring network interfaces. Change, view, or configure the routing table and correct an improperly set default route manually. Debug problems associated with the network configuration. The following is a partial list of the used files, terms and utilities: ifconfig ifup ifdown route host hostname dig netstat ping traceroute 109.4 Configure client side DNS Candidates should be able to configure DNS on a client host. 11.4 Demonstrate the use of DNS on the local system. Modify the order in which name resolution is done. The following is a partial list of the used files, terms and utilities: /etc/hosts /etc/resolv.conf /etc/nsswitch.conf 110 Security 110.1 Perform security administration tasks Candidates should know how to review system configuration to ensure host security in accordance with local security policies. 12.1 12.2 12.3 12.4 Audit a system to find files with the suid/sgid bit set. Set or change user passwords and password aging information. Being able to use nmap and netstat to discover open ports on a system. Set up limits on user logins, processes and memory usage. Basic sudo configuration and usage. The following is a partial list of the used files, terms and utilities: find Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. passwd lsof nmap chage netstat sudo /etc/sudoers su usermod ulimit 110.2 Setup host security Candidates should know how to set up a basic level of host security. 12.5 12.6 Awareness of shadow passwords and how they work. Turn off network services not in use. Understand the role of TCP wrappers. The following is a partial list of the used files, terms and utilities: /etc/nologin /etc/passwd /etc/shadow /etc/xinetd.d/* /etc/xinetd.conf /etc/inetd.d/* /etc/inetd.conf /etc/inittab /etc/init.d/* /etc/hosts.allow /etc/hosts.deny 110.3 Securing data with encryption The candidate should be able to use public key techniques to secure data and communication. 12.7 12.8 12.9 12.10 Perform basic OpenSSH 2 client configuration and usage. Understand the role of OpenSSH 2 server host keys Perform basic GnuPG configuration, usage and revocation. Understand SSH port tunnels (including X11 tunnels). The following is a partial list of the used files, terms and utilities: ssh ssh-keygen ssh-agent ssh-add ~/.ssh/id_rsa and id_rsa.pub ~/.ssh/id_dsa and id_dsa.pub /etc/ssh/ssh_host_rsa_key and ssh_host_rsa_key.pub Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them. /etc/ssh/ssh_host_dsa_key and ssh_host_dsa_key.pub ~/.ssh/authorized_keys /etc/ssh_known_hosts gpg ~/.gnupg/* Copyright © 2015 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+ and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. (ISC)2 and SSCP are the trademarks of (ISC)2. TestOut has no affiliation with any of these companies and the products and services advertised herein are not endorsed by any of them.