Book Image

CompTIA Linux+ Certification Guide

By : Philip Inshanally
Book Image

CompTIA Linux+ Certification Guide

By: Philip Inshanally

Overview of this book

The Linux+ certification provides a broad awareness of Linux operating systems, while giving professionals an upper hand in the IT industry. With this certification, you’ll be equipped with the all-important knowledge of installation, operation, administration, and troubleshooting services. This CompTIA Linux+ Certification Guide will give you an overview of the system architecture. You’ll understand how to install and uninstall Linux distributions, followed by working with various package managers. You’ll then move on to manipulating files and processes at the command-line interface (CLI) and creating, monitoring, killing, restarting, and modifying processes. As you progress, you’ll be equipped to work with display managers and learn how you can create, modify, and remove user accounts and groups, as well as understand how to automate tasks. The last set of chapters will help you configure dates and set up local and remote system logging. In addition to this, you’ll explore different internet protocols, and delve into network configuration, security administration, Shell scripting, and SQL management. By the end of this book, you’ll not only have got to grips with all the modules you need to study for the LX0-103 and LX0-104 certification exams, but you’ll also be able to test your understanding with practice questions and mock exams.
Table of Contents (23 chapters)
19
Mock Exam - 1
20
Mock Exam - 2

Summary

In this chapter, we covered a wide array of security features that are available to us in the Linux environment. First, we covered accessing commands with root privileges; particularly, we looked at the su and sudo commands. We then moved on to TCP wrappers, focusing on the /etc/hosts.allow and /etc/hosts.deny files. We looked at how the two files can complement each other by allowing access via the /etc/hosts.allow file and denying everything in the /etc/hosts.deny file.

Next, we covered SSH; we looked at setting up SSH access between a client and a server, allowing for a seamless login without entering a password, and we covered using a passphrase. We then cached the passphrase, so that the user would not have to enter a passphrase when logging into the server. Finally, we covered encryption in depth. We focused on symmetric encryption, which involves a passphrase; we...