You are previewing CompTIA Linux+™ Study Guide.
O'Reilly logo
CompTIA Linux+™ Study Guide

Book Description

Authoritative coverage on the first Linux+ exam revision in more than five years

The Linux+ exam is an entry-level Linux certification exam administered by CompTIA that covers your knowledge of basic Linux system administration skills. With this being the first update to the exam in more than five years, you'll need to be prepared on the most up-to-date information on all Linux administration topics.

Boasting clear and concise material, practical examples, and insights drawn from real-world experience, this study guide is an indispensable resource.

  • Completely updated for the newest Linux+ exam-the first exam revision in more than five years

  • Thorough coverage on key exam topics, including installation and configuration, system maintenance and operations, application and services, networking, and security

  • Packed with chapter review questions, real-world scenarios, hands-on exercises, and a glossary of the most important terms you need to know

  • CD features two practice exams, electronic flashcards, interactive chapter review questions, and the book in a searchable PDF

Written by a highly respected and recognized author in the field of Linux, this study guide prepares you for the completely new Linux+ exam.

Table of Contents

  1. Copyright
  2. Preface
  3. Dear Reader,
  4. Acknowledgments
  5. Introduction
    1. What Is Linux?
    2. Why Become Linux+ Certified?
    3. How to Become Linux+ Certified
    4. Who Should Buy This Book
    5. How This Book Is Organized
    6. Bonus CD-ROM Contents
    7. Conventions Used in This Book
    8. The Exam Objectives
      1. Domain 1.0 Installation and Configuration
      2. Domain 2.0 System Maintenance and Operations
      3. Domain 3.0 Application and Services
      4. Domain 4.0 Networking
      5. Domain 5.0 Security
  6. Assessment Test
  7. Answers to Assessment Test
  8. 1. Getting Started with Linux
    1. 1.1. Selecting an Installation Method
      1. 1.1.1. Choosing a Distribution
      2. 1.1.2. Selecting an Installation Medium
        1. 1.1.2.1. The Boot Method
        2. 1.1.2.2. Installation Media
      3. 1.1.3. Interacting with the Installer
      4. 1.1.4. Performing the Installation
    2. 1.2. Configuring Boot Loaders
      1. 1.2.1. The Role of the Boot Loader
      2. 1.2.2. Available Boot Loaders
      3. 1.2.3. Configuring GRUB
        1. 1.2.3.1. Setting Global GRUB Options
        2. 1.2.3.2. Setting OS Boot Options
        3. 1.2.3.3. Adding a New Kernel or OS to GRUB
    3. 1.3. Troubleshooting Boot Problems
      1. 1.3.1. Setting Kernel Options in GRUB
      2. 1.3.2. Using Rescue Discs
      3. 1.3.3. Resetting the root Password
      4. 1.3.4. Examining Boot Messages with dmesg
    4. 1.4. Configuring X
      1. 1.4.1. Selecting an X Server
        1. 1.4.1.1. Determining Your Video Card Chipset
        2. 1.4.1.2. Choosing an X Server
        3. 1.4.1.3. Installing an X Server or Driver
      2. 1.4.2. Setting Up X
        1. 1.4.2.1. Methods of Configuring X
        2. 1.4.2.2. Setting Miscellaneous Options
        3. 1.4.2.3. Setting Monitor Options
        4. 1.4.2.4. Setting Video Card Options
        5. 1.4.2.5. Setting Screen Options
      3. 1.4.3. Managing GUI Logins
        1. 1.4.3.1. Understanding GUI Logins
        2. 1.4.3.2. Running an XDMCP Server
        3. 1.4.3.3. Configuring an XDMCP Server
          1. 1.4.3.3.1. Configuring XDM
          2. 1.4.3.3.2. Configuring KDM
          3. 1.4.3.3.3. Configuring GDM
      4. 1.4.4. Using Window Managers and Desktop Environments
      5. 1.4.5. Using Terminal Programs
    5. 1.5. Managing Hardware
      1. 1.5.1. Finding Compatible Hardware
      2. 1.5.2. Identifying Hardware in Linux
        1. 1.5.2.1. Identifying PCI Devices
        2. 1.5.2.2. Identifying USB Devices
        3. 1.5.2.3. Identifying Kernel Drivers
        4. 1.5.2.4. Using the /proc Filesystem
      3. 1.5.3. Managing Kernel Modules
        1. 1.5.3.1. Loading Kernel Modules
        2. 1.5.3.2. Removing Kernel Modules
    6. 1.6. Summary
    7. 1.7. Exam Essentials
    8. 1.8. Review Questions
    9. 1.9. Answers to Review Questions
  9. 2. Using Text-Mode Commands
    1. 2.1. Using a Command Shell
      1. 2.1.1. Starting a Shell
      2. 2.1.2. Using Virtual Terminals
      3. 2.1.3. Launching Programs
      4. 2.1.4. Using Shell Shortcuts
      5. 2.1.5. Using the Shell's History
    2. 2.2. Manipulating Files and Directories
      1. 2.2.1. Navigating the Linux Filesystem
        1. 2.2.1.1. Listing Files
        2. 2.2.1.2. Using Wildcards
        3. 2.2.1.3. Finding and Changing the Current Directory
      2. 2.2.2. Manipulating Files
        1. 2.2.2.1. Copying Files
        2. 2.2.2.2. Moving and Renaming Files
        3. 2.2.2.3. Removing Files
        4. 2.2.2.4. Touching Files
        5. 2.2.2.5. Creating Links
      3. 2.2.3. Manipulating Directories
        1. 2.2.3.1. Creating Directories
        2. 2.2.3.2. Removing Directories
      4. 2.2.4. Locating Files
        1. 2.2.4.1. Using the find Command
        2. 2.2.4.2. Using the locate Command
        3. 2.2.4.3. Using the whereis Command
      5. 2.2.5. Examining Files' Contents
        1. 2.2.5.1. Finding Files by Content
        2. 2.2.5.2. Viewing Short Text Files and Combining Text Files
        3. 2.2.5.3. Viewing Long Text Files
        4. 2.2.5.4. Viewing the Ends of Files
      6. 2.2.6. Using Redirection and Pipes
      7. 2.2.7. Generating Command Lines
      8. 2.2.8. Using Device Files
    3. 2.3. Using File Permissions
      1. 2.3.1. Understanding Accounts and Ownership
      2. 2.3.2. Using File Access Permissions
        1. 2.3.2.1. Understanding File Access Components
        2. 2.3.2.2. Interpreting File Access Codes
        3. 2.3.2.3. Determining File Types
      3. 2.3.3. Changing File Ownership and Permissions
        1. 2.3.3.1. Modifying Ownership
        2. 2.3.3.2. Modifying Permissions
      4. 2.3.4. Setting Default Permissions
      5. 2.3.5. Using ACLs
    4. 2.4. Setting Environment Variables
      1. 2.4.1. Where to Set Environment Variables
      2. 2.4.2. The Meanings of Common Environment Variables
    5. 2.5. Using Shell Scripts
    6. 2.6. Getting Help
      1. 2.6.1. Using Man Pages
      2. 2.6.2. Using Info Pages
      3. 2.6.3. Using Miscellaneous Program Documentation
      4. 2.6.4. Using Internet-Based Help Resources
    7. 2.7. Summary
    8. 2.8. Exam Essentials
    9. 2.9. Review Questions
    10. 2.10. Answers to Review Questions
  10. 3. Managing Processes and Editing Files
    1. 3.1. Managing Processes
      1. 3.1.1. Understanding Processes
      2. 3.1.2. Examining Process Lists with ps
        1. 3.1.2.1. Examining ps Options
        2. 3.1.2.2. Interpreting ps Output
        3. 3.1.2.3. Viewing Processes Dynamically
      3. 3.1.3. Restricting Processes' CPU Use
      4. 3.1.4. Killing Processes
      5. 3.1.5. Controlling Foreground and Background Processes
      6. 3.1.6. Monitoring System Statistics
        1. 3.1.6.1. Obtaining General-Purpose System Statistics
        2. 3.1.6.2. Obtaining Input/Output Statistics
        3. 3.1.6.3. Obtaining Virtual Memory Statistics
    2. 3.2. Setting Process Permissions
      1. 3.2.1. Understanding the Risks of SUID and SGID Programs
      2. 3.2.2. Knowing When to Use SUID or SGID
      3. 3.2.3. Finding SUID or SGID Programs
    3. 3.3. Running Jobs at Specific Times
      1. 3.3.1. Understanding the Role of Cron
      2. 3.3.2. Creating System Cron Jobs
      3. 3.3.3. Creating User Cron Jobs
      4. 3.3.4. Using at
    4. 3.4. Getting and Setting Kernel Information
      1. 3.4.1. Obtaining Kernel Version Information
      2. 3.4.2. Setting System Control Data
    5. 3.5. Editing Files with Vi
      1. 3.5.1. Using Vi Modes
      2. 3.5.2. Editing Text
      3. 3.5.3. Saving Changes
    6. 3.6. Summary
    7. 3.7. Exam Essentials
    8. 3.8. Review Questions
    9. 3.9. Answers to Review Questions
  11. 4. Managing System Services
    1. 4.1. Starting and Stopping Services
      1. 4.1.1. Methods of Starting and Stopping Services
      2. 4.1.2. Starting and Stopping via SysV Scripts
        1. 4.1.2.1. Temporarily Starting or Stopping a Service
        2. 4.1.2.2. Permanently Starting or Stopping a Service
      3. 4.1.3. Using Super Servers
        1. 4.1.3.1. Editing inetd.conf or inetd.d Files
        2. 4.1.3.2. Editing xinetd.conf or xinetd.d Files
        3. 4.1.3.3. Controlling Super Server Security
          1. 4.1.3.3.1. Controlling Access via TCP Wrappers
          2. 4.1.3.3.2. Controlling Access via xinetd
      4. 4.1.4. Using Custom Startup Files
    2. 4.2. Setting the Runlevel
      1. 4.2.1. Understanding the Role of the Runlevel
      2. 4.2.2. Using init or telinit to Change the Runlevel
      3. 4.2.3. Permanently Changing the Runlevel
    3. 4.3. Configuring Log Files
      1. 4.3.1. Understanding syslogd
      2. 4.3.2. Setting Logging Options
      3. 4.3.3. Rotating Log Files
      4. 4.3.4. Using a Remote Server for Log Files
    4. 4.4. Using Log Files
      1. 4.4.1. Which Log Files Are Important?
      2. 4.4.2. Using Log Files to Identify Problems
      3. 4.4.3. Using Tools to Help Scan Log Files
        1. 4.4.3.1. Checking the Beginnings of Log Files
        2. 4.4.3.2. Checking the Ends of Log Files
        3. 4.4.3.3. Searching Log Files
        4. 4.4.3.4. Using sed and awk
        5. 4.4.3.5. Using Additional Log File Analysis Tools
    5. 4.5. Summary
    6. 4.6. Exam Essentials
    7. 4.7. Review Questions
    8. 4.8. Answers to Review Questions
  12. 5. Managing Users
    1. 5.1. Understanding Multiuser Concepts
      1. 5.1.1. User Accounts: The Core of a Multiuser System
        1. 5.1.1.1. Accounts in a Multiuser System
        2. 5.1.1.2. Accounts in a Multitasking System
        3. 5.1.1.3. The Superuser Account
        4. 5.1.1.4. Linux Usernames
      2. 5.1.2. Linking Users Together for Productivity via Groups
      3. 5.1.3. Mapping UIDs and GIDs to Users and Groups
      4. 5.1.4. Understanding Home Directories
    2. 5.2. Configuring User Accounts
      1. 5.2.1. Adding Users
      2. 5.2.2. Modifying User Accounts
        1. 5.2.2.1. Setting a Password
        2. 5.2.2.2. Using usermod
        3. 5.2.2.3. Using chage
        4. 5.2.2.4. Directly Modifying Account Configuration Files
      3. 5.2.3. Deleting Accounts
      4. 5.2.4. Verifying Account Use
        1. 5.2.4.1. Checking Who's Logged In
        2. 5.2.4.2. Checking Historical Login Data
        3. 5.2.4.3. Verifying Your Identity
    3. 5.3. Configuring Groups
      1. 5.3.1. Adding Groups
      2. 5.3.2. Modifying Group Information
        1. 5.3.2.1. Using groupmod and usermod
        2. 5.3.2.2. Using gpasswd
        3. 5.3.2.3. Directly Modifying Group Configuration Files
      3. 5.3.3. Deleting Groups
    4. 5.4. Using Common User and Group Strategies
      1. 5.4.1. Using User Private Groups
      2. 5.4.2. Using Project Groups
      3. 5.4.3. Assigning Users to Multiple Groups
    5. 5.5. Improving Account Security
      1. 5.5.1. Enforcing User Password Security
      2. 5.5.2. Steps for Reducing the Risk of Compromised Passwords
      3. 5.5.3. Disabling Unused Accounts
      4. 5.5.4. Using Shadow Passwords
    6. 5.6. Controlling System Access
      1. 5.6.1. Accessing Common Servers
        1. 5.6.1.1. Controlling Login Access
        2. 5.6.1.2. Controlling FTP Access
      2. 5.6.2. Controlling root Access
    7. 5.7. Summary
    8. 5.8. Exam Essentials
    9. 5.9. Review Questions
    10. 5.10. Answers to Review Questions
  13. 6. Managing Disks
    1. 6.1. Storage Hardware Identification
      1. 6.1.1. Types of Storage Devices
      2. 6.1.2. Linux Storage Hardware Configuration
    2. 6.2. Planning Disk Partitioning
      1. 6.2.1. Understanding Partitioning Systems
        1. 6.2.1.1. MBR Partitions
        2. 6.2.1.2. GPT Partitions
      2. 6.2.2. Linux Partition Requirements
      3. 6.2.3. Common Optional Partitions
      4. 6.2.4. Linux Filesystem Options
      5. 6.2.5. Partitioning Tools
    3. 6.3. Partition Management and Maintenance
      1. 6.3.1. Creating Partitions
        1. 6.3.1.1. Using fdisk to Create Partitions
        2. 6.3.1.2. Using GNU Parted to Create Partitions
      2. 6.3.2. Creating New Filesystems
      3. 6.3.3. Checking a Filesystem for Errors
      4. 6.3.4. Adding Swap Space
        1. 6.3.4.1. Evaluating Swap Space Use
        2. 6.3.4.2. Adding a Swap File
        3. 6.3.4.3. Adding a Swap Partition
      5. 6.3.5. Setting Filesystem Quotas
    4. 6.4. Partition Control
      1. 6.4.1. Identifying Partitions
      2. 6.4.2. Mounting and Unmounting Partitions
        1. 6.4.2.1. Syntax and Parameters for mount
        2. 6.4.2.2. Using mount Options
        3. 6.4.2.3. Using umount
      3. 6.4.3. Using Network Filesystems
        1. 6.4.3.1. Accessing SMB/CIFS Shares
        2. 6.4.3.2. Accessing NFS Exports
      4. 6.4.4. Using df
      5. 6.4.5. Defining Standard Filesystems
      6. 6.4.6. Using RAID
        1. 6.4.6.1. Forms of RAID
        2. 6.4.6.2. Designing a RAID Array
        3. 6.4.6.3. Configuring Linux RAID
      7. 6.4.7. Using LVM
        1. 6.4.7.1. Understanding LVM
        2. 6.4.7.2. Defining Physical Volumes
        3. 6.4.7.3. Defining Volume Groups
        4. 6.4.7.4. Defining Logical Volumes
        5. 6.4.7.5. Working with Logical Volumes
    5. 6.5. Summary
    6. 6.6. Exam Essentials
    7. 6.7. Review Questions
    8. 6.8. Answers to Review Questions
  14. 7. Managing Packages and System Backups
    1. 7.1. Understanding Package Concepts
      1. 7.1.1. File Collections
      2. 7.1.2. The Installed File Database
      3. 7.1.3. Using Network Repositories
      4. 7.1.4. Rebuilding Packages
    2. 7.2. Installing and Removing Packages
      1. 7.2.1. Handling RPM Packages
        1. 7.2.1.1. RPM Distributions and Conventions
        2. 7.2.1.2. Using rpm Commands
        3. 7.2.1.3. Using Yum
      2. 7.2.2. Handling Debian Packages
        1. 7.2.2.1. Debian Package Conventions
        2. 7.2.2.2. Using dpkg Commands
        3. 7.2.2.3. Using APT
      3. 7.2.3. Handling Tarballs
        1. 7.2.3.1. The Role of tar and Tarballs
        2. 7.2.3.2. Using tar Commands
        3. 7.2.3.3. Creating Tarballs
      4. 7.2.4. Compiling Source Code
        1. 7.2.4.1. Procedures for Compiling and Installing Source Code
        2. 7.2.4.2. Special Procedures for the Kernel and Drivers
    3. 7.3. Managing Package Dependencies and Conflicts
      1. 7.3.1. Real and Imagined Package Dependency Problems
      2. 7.3.2. Workarounds to Package Dependency Problems
    4. 7.4. Backing Up and Restoring a Computer
      1. 7.4.1. Common Backup Hardware
      2. 7.4.2. Common Backup Programs
        1. 7.4.2.1. The cpio Utility
        2. 7.4.2.2. Using cpio or tar to Back Up a Computer
        3. 7.4.2.3. Using dump and restore to Back Up and Restore a Computer
        4. 7.4.2.4. Using mt to Control a Tape Drive
      3. 7.4.3. Performing Network Backups with rsync
      4. 7.4.4. Planning a Backup Schedule
      5. 7.4.5. Preparing for Disaster: Backup Recovery
    5. 7.5. Writing to Optical Discs
      1. 7.5.1. Linux Optical Disc Tools
      2. 7.5.2. A Linux Optical Disc Example
      3. 7.5.3. Creating Cross-Platform Discs
    6. 7.6. Summary
    7. 7.7. Exam Essentials
    8. 7.8. Review Questions
    9. 7.9. Answers to Review Questions
  15. 8. Configuring Basic Networking
    1. 8.1. Understanding Networks
      1. 8.1.1. Basic Functions of Network Hardware
      2. 8.1.2. Types of Network Hardware
      3. 8.1.3. Network Packets
      4. 8.1.4. Network Protocol Stacks
        1. 8.1.4.1. What Is a Protocol Stack?
        2. 8.1.4.2. The OSI Model
        3. 8.1.4.3. The TCP/IP Protocol Stack
        4. 8.1.4.4. Alternatives to TCP/IP
    2. 8.2. Network Addressing
      1. 8.2.1. Types of Network Addresses
        1. 8.2.1.1. Hardware Addresses
        2. 8.2.1.2. IP Addresses
        3. 8.2.1.3. Hostnames
      2. 8.2.2. Resolving Hostnames
      3. 8.2.3. Network Ports
    3. 8.3. Basic Network Configuration
      1. 8.3.1. Network Hardware Configuration
      2. 8.3.2. Setting Wireless Options
      3. 8.3.3. DHCP Configuration
      4. 8.3.4. Static IP Address Configuration
        1. 8.3.4.1. Making Permanent Changes in Fedora
        2. 8.3.4.2. Making Permanent Changes in Ubuntu
        3. 8.3.4.3. Setting DNS Options
        4. 8.3.4.4. Implementing Permanent Changes
        5. 8.3.4.5. Setting Temporary Options
      5. 8.3.5. Using GUI Configuration Tools
    4. 8.4. Diagnosing Network Problems
      1. 8.4.1. Examining the ARP Cache
      2. 8.4.2. Testing Basic Connectivity
      3. 8.4.3. Tracing a Route
      4. 8.4.4. Checking Network Status
      5. 8.4.5. Name Server Troubleshooting
      6. 8.4.6. Using General Network Tools
    5. 8.5. Summary
    6. 8.6. Exam Essentials
    7. 8.7. Review Questions
    8. 8.8. Answers to Review Questions
  16. 9. Configuring Advanced Networking
    1. 9.1. Routing Between Networks
    2. 9.2. Firewall Configuration
      1. 9.2.1. Where a Firewall Fits in a Network
      2. 9.2.2. Linux Firewall Software
      3. 9.2.3. Common Server Ports
      4. 9.2.4. Using iptables
        1. 9.2.4.1. The Linux Packet Filter Architecture
        2. 9.2.4.2. Creating Firewall Rules
        3. 9.2.4.3. A Sample iptables Configuration
    3. 9.3. Managing Remote Logins
      1. 9.3.1. Setting Up a Remote Access Server
      2. 9.3.2. Using Text-Mode Logins
      3. 9.3.3. Generating SSH Keys
      4. 9.3.4. Using X Programs Remotely
      5. 9.3.5. Remote GUI Logins
        1. 9.3.5.1. Configuring an XDMCP Server
        2. 9.3.5.2. Using an X Server
    4. 9.4. Configuring Basic Printing
      1. 9.4.1. The Linux Printing Architecture
      2. 9.4.2. Understanding PostScript and Ghostscript
        1. 9.4.2.1. PostScript: The De Facto Linux Printer Language
        2. 9.4.2.2. Ghostscript: A PostScript Translator
        3. 9.4.2.3. Squeezing Ghostscript into the Queue
      3. 9.4.3. Running a Printing System
      4. 9.4.4. Configuring CUPS
        1. 9.4.4.1. Editing the CUPS Configuration Files
        2. 9.4.4.2. Obtaining CUPS Printer Definitions
        3. 9.4.4.3. Using the Web-Based CUPS Utilities
      5. 9.4.5. Printing to Network Printers
      6. 9.4.6. Monitoring and Controlling Print Queues
        1. 9.4.6.1. Printing Files
        2. 9.4.6.2. Displaying Print Queue Information
        3. 9.4.6.3. Removing Print Jobs from the Queue
        4. 9.4.6.4. Controlling the Print Queue
    5. 9.5. Summary
    6. 9.6. Exam Essentials
    7. 9.7. Review Questions
    8. 9.8. Answers to Review Questions
  17. 10. Configuring Network Servers I
    1. 10.1. Delivering Network Information
      1. 10.1.1. Delivering IP Addresses with DHCP
      2. 10.1.2. Delivering Hostnames with DNS
        1. 10.1.2.1. Setting Overall BIND Options
        2. 10.1.2.2. Configuring the Root Zone
        3. 10.1.2.3. Configuring a Domain with BIND
          1. 10.1.2.3.1. Adding a Zone Reference to the Main BIND Configuration File
          2. 10.1.2.3.2. Creating a Forward Zone File
          3. 10.1.2.3.3. Creating a Reverse Zone File
        4. 10.1.2.4. Running a DNS Server
      3. 10.1.3. Delivering the Time with NTP
        1. 10.1.3.1. Understanding NTP Basics
        2. 10.1.3.2. Locating a Time Source
        3. 10.1.3.3. Configuring NTP Servers
        4. 10.1.3.4. Configuring NTP Clients
      4. 10.1.4. Authenticating Users on the Network
    2. 10.2. Using E-mail
      1. 10.2.1. Understanding E-mail Protocols
      2. 10.2.2. Configuring SMTP Servers
        1. 10.2.2.1. Configuring Sendmail
        2. 10.2.2.2. Configuring Postfix
        3. 10.2.2.3. Managing Mail Queues
      3. 10.2.3. Using Aliases and Forwarding E-mail
      4. 10.2.4. Choosing a POP or IMAP Server
    3. 10.3. Summary
    4. 10.4. Exam Essentials
    5. 10.5. Review Questions
    6. 10.6. Answers to Review Questions
  18. 11. Configuring Network Servers II
    1. 11.1. Delivering Files Over the Network
      1. 11.1.1. Delivering Files with Samba
        1. 11.1.1.1. Setting Basic Samba Options
        2. 11.1.1.2. Resolving Hostnames in Samba
        3. 11.1.1.3. Sharing Files with Samba
        4. 11.1.1.4. Sharing Printers with Samba
        5. 11.1.1.5. Using a Windows Domain
      2. 11.1.2. Delivering Files with NFS
        1. 11.1.2.1. Configuring the NFS Server
        2. 11.1.2.2. Modifying or Viewing the NFS Configuration on the Fly
        3. 11.1.2.3. Understanding NFS Security Concerns
      3. 11.1.3. Delivering Files with FTP
        1. 11.1.3.1. Choosing an FTP Server
        2. 11.1.3.2. FTP Server Configuration
        3. 11.1.3.3. Using FTP Clients
      4. 11.1.4. Configuring Web Servers
        1. 11.1.4.1. Setting Basic Apache Options
        2. 11.1.4.2. Using Apache Modules
        3. 11.1.4.3. Configuring Scripts
        4. 11.1.4.4. Configuring Virtual Hosting
        5. 11.1.4.5. Controlling Apache
        6. 11.1.4.6. Using Web Proxy Servers
        7. 11.1.4.7. Using Text-Based Web Clients
    2. 11.2. Using Windows Remote Access Tools
      1. 11.2.1. Using rdesktop
      2. 11.2.2. Using VNC
        1. 11.2.2.1. Configuring a VNC Server
        2. 11.2.2.2. Using a VNC Client
    3. 11.3. Deploying MySQL
      1. 11.3.1. Picking a SQL Package
      2. 11.3.2. Using MySQL
        1. 11.3.2.1. Configuring, Starting, and Stopping MySQL
        2. 11.3.2.2. Testing the MySQL Connection
    4. 11.4. Summary
    5. 11.5. Exam Essentials
    6. 11.6. Review Questions
    7. 11.7. Answers to Review Questions
  19. 12. Securing Linux
    1. 12.1. Sources of Security Vulnerability
      1. 12.1.1. Physical Access Problems
      2. 12.1.2. Stolen Passwords
      3. 12.1.3. Local Program Bugs
      4. 12.1.4. Server Bugs
      5. 12.1.5. Denial-of-Service Attacks
      6. 12.1.6. Encryption Issues
      7. 12.1.7. The Human Element
    2. 12.2. Authenticating Users
      1. 12.2.1. Understanding How Linux Authenticates Users
      2. 12.2.2. Configuring PAM
      3. 12.2.3. Using Network Authentication
        1. 12.2.3.1. Using NIS
        2. 12.2.3.2. Using LDAP
        3. 12.2.3.3. Understanding RADIUS
      4. 12.2.4. Using Two-Factor Authentication
    3. 12.3. Using GNU Privacy Guard (GPG)
      1. 12.3.1. Generating and Importing Keys
      2. 12.3.2. Encrypting and Decrypting Data
      3. 12.3.3. Signing Messages and Verifying Signatures
    4. 12.4. SELinux
      1. 12.4.1. Principles of SELinux
      2. 12.4.2. Configuring SELinux Running Modes
    5. 12.5. Security Auditing
      1. 12.5.1. Checking for Open Ports
        1. 12.5.1.1. Using Local Network Activity Tools
        2. 12.5.1.2. Using Remote Network Scanners
      2. 12.5.2. Reviewing Accounts
      3. 12.5.3. Verifying Installed Files and Packages
    6. 12.6. Intrusion Detection
      1. 12.6.1. Symptoms of Intrusion
      2. 12.6.2. Using Snort
      3. 12.6.3. Using PortSentry
      4. 12.6.4. Using Wireshark
      5. 12.6.5. Using Tripwire
      6. 12.6.6. Generating Checksums Manually
      7. 12.6.7. Using Package Manager Checksums
      8. 12.6.8. Using chkrootkit
      9. 12.6.9. Monitoring Log Files
    7. 12.7. Summary
    8. 12.8. Exam Essentials
    9. 12.9. Review Questions
    10. 12.10. Answers to Review Questions
  20. A. About the Companion CD
    1. A.1. What You'll Find on the CD
      1. A.1.1. Sybex Test Engine
      2. A.1.2. PDF of the Book
      3. A.1.3. Adobe Reader
      4. A.1.4. Electronic Flashcards
    2. A.2. System Requirements
    3. A.3. Using the CD
    4. A.4. Troubleshooting
      1. A.4.1. Customer Care
  21. Glossary