CompTIA Linux+ (XK0-006) glossary
Terms selected for CompTIA Linux+ (XK0-006) based on common objective language and practice focus.
DNS
Domain Name System translates hostnames into IP addresses.
Read full term ->RAID
RAID (Redundant Array of Independent Disks) is a storage technology that combines multiple disk drives into a single unit for redundancy or performance improvement.
Read full term ->Virtual Machine
Software-defined computer running as an isolated guest system.
Read full term ->Virtualization
The creation of a virtual version of something, such as an operating system, a server, a storage device, or network resources.
Read full term ->Bash
Common Linux shell used for command execution and scripting.
Read full term ->File Permissions
File permissions in Linux determine the access level users have to files and directories, including read, write, and execute rights.
Read full term ->Linux Shell
Command interpreter used to run Linux commands and scripts.
Read full term ->Multi-Factor Authentication (MFA)
MFA is a security process that requires users to provide multiple forms of identification before granting access to resources.
Read full term ->Ansible
Automation platform used for configuration management and orchestration.
Read full term ->Container Image
Packaged filesystem and runtime instructions used to create containers.
Read full term ->Containerization
Application packaging method that bundles code and dependencies into isolated runtime units.
Read full term ->Docker
Popular platform and tooling ecosystem for building and running containers.
Read full term ->Hypervisor
Software layer that creates and manages virtual machines on physical hardware.
Read full term ->Infrastructure as Code (IaC)
The practice of managing and provisioning computing infrastructure through machine-readable definition files, rather than physical hardware configuration.
Read full term ->Kubernetes
Container orchestration platform for deploying, scaling, and managing containerized workloads.
Read full term ->Octal
Base-8 number system using digits 0 through 7.
Read full term ->apt
Package manager command interface for Debian-based Linux distributions.
Read full term ->Backup and Restore
Backup and restore involve creating copies of data to prevent loss and recovering data from backups in case of failure.
Read full term ->Boot Troubleshooting
Boot troubleshooting involves diagnosing and resolving issues that prevent a Linux system from starting correctly.
Read full term ->chmod
Linux command used to modify file and directory permissions.
Read full term ->chown
Linux command used to change file or directory ownership.
Read full term ->CI/CD
CI/CD stands for Continuous Integration and Continuous Deployment, a practice that automates the integration and deployment of code changes.
Read full term ->Container Engine
A container engine is software that allows the creation, management, and execution of containers, which are lightweight, portable application environments.
Read full term ->CPU Architecture
CPU architecture refers to the design and functionality of a computer's central processing unit, determining how it processes data and executes instructions.
Read full term ->cron
Time-based job scheduler for running commands at defined intervals.
Read full term ->crontab
Per-user table defining scheduled cron tasks.
Read full term ->TTY Console
Virtual text consoles available on Linux systems outside graphical sessions.
Read full term ->Daemon
Background service process that provides system or application functionality.
Read full term ->df
Command that reports filesystem disk space usage.
Read full term ->dig
DNS lookup tool for querying records and troubleshooting name resolution.
Read full term ->dnf
Package manager used on modern RPM-based Linux distributions.
Read full term ->du
Command that estimates file and directory disk usage.
Read full term ->File Encryption
File encryption is the process of converting data into a coded format to prevent unauthorized access.
Read full term ->Filesystem
A filesystem is a method and data structure that an operating system uses to control how data is stored and retrieved.
Read full term ->firewalld
Dynamic firewall management service commonly used on RHEL-family systems.
Read full term ->/etc/fstab
Configuration file defining persistent filesystem mount behavior.
Read full term ->Git Version Control
Distributed version control system used to track changes in code and configuration files used in network automation projects.
Read full term ->grep
Text-search command for matching patterns in files and command output.
Read full term ->groupadd
Command used to create new local groups on Linux.
Read full term ->Hard Link
Directory entry pointing directly to an inode on the same filesystem.
Read full term ->Inode
Filesystem metadata structure describing file attributes and block locations.
Read full term ->Integrity Verification
Integrity verification involves checking data for alterations or corruption, ensuring that it remains unchanged and reliable.
Read full term ->iptables
Legacy Linux packet filtering framework for firewall rule management.
Read full term ->journalctl
Command for querying and viewing systemd journal logs.
Read full term ->Kerberos
Kerberos is a network authentication protocol designed to provide strong authentication for client-server applications using secret-key cryptography.
Read full term ->Kernel
The kernel is the core component of a Linux operating system, managing hardware resources and providing essential services to applications.
Read full term ->Kernel Module
Loadable component extending Linux kernel capabilities without rebooting.
Read full term ->LDAP
Directory access protocol used for querying and managing identity directory services.
Read full term ->Linux Boot Process
The Linux boot process is the sequence of steps the system takes from powering on to loading the operating system and starting user space applications.
Read full term ->LVM
Logical Volume Manager abstraction layer for flexible disk and volume management.
Read full term ->modprobe
Utility that loads or removes kernel modules with dependency handling.
Read full term ->mount
Command that attaches filesystems to the Linux directory tree.
Read full term ->Network Interface
A network interface is a software or hardware component that connects a computer to a network, enabling communication with other devices.
Read full term ->Network Troubleshooting
Network troubleshooting involves diagnosing and resolving connectivity issues in a network, ensuring reliable communication between devices.
Read full term ->nftables
Modern Linux packet filtering framework replacing iptables in many distributions.
Read full term ->nice
Command that launches processes with adjusted CPU scheduling priority.
Read full term ->OS Hardening
OS hardening involves securing a Linux operating system by implementing best practices and configurations to reduce vulnerabilities.
Read full term ->PAM
Pluggable Authentication Modules framework for Linux authentication policy.
Read full term ->/etc/passwd
System file containing user account metadata and login shell information.
Read full term ->Performance Tuning
The process of adjusting system parameters to improve the speed and efficiency of generative AI applications.
Read full term ->Octal Permissions
Numeric Linux permission representation for owner, group, and others.
Read full term ->PID
Process identifier assigned by the OS to each running process.
Read full term ->Process Management
Process management in Linux involves monitoring and controlling active processes, including adjusting priorities and scheduling jobs.
Read full term ->Puppet
Puppet is an open-source configuration management tool that automates the deployment and management of system configurations.
Read full term ->Python Basics
Python basics cover fundamental programming concepts in Python, including data types, control structures, and functions.
Read full term ->Python Virtual Environment
Isolated Python dependency environment for application-specific packages.
Read full term ->mdadm
Linux utility for creating and managing software RAID arrays.
Read full term ->renice
Command used to change scheduling priority of running processes.
Read full term ->rsync
Efficient file synchronization tool transferring only changed data blocks.
Read full term ->SELinux
Mandatory access control framework enforcing security policy labels on Linux.
Read full term ->setgid
Permission bit affecting executable group privilege or directory group inheritance.
Read full term ->setuid
Permission bit allowing executable files to run with owner privileges.
Read full term ->SFTP
Secure file transfer protocol running over SSH.
Read full term ->/etc/shadow
Protected system file containing password hashes and aging policy data.
Read full term ->Shell Navigation
Shell navigation refers to the use of command-line interfaces to move through directories and manage files in a Linux environment.
Read full term ->Shell Scripting
Shell scripting involves writing scripts using shell commands and syntax to automate tasks and processes on a Linux system.
Read full term ->Software Package Management
Software package management involves installing, updating, and removing software applications using package managers like apt, yum, and zypper.
Read full term ->SSH
Secure Shell protocol for encrypted remote command-line access.
Read full term ->Sticky Bit
Directory permission control restricting file deletion to owners and privileged users.
Read full term ->System Health Monitoring
System health monitoring involves tracking system performance metrics, such as CPU usage and memory consumption, to ensure optimal operation.
Read full term ->System Services
System services are background processes that perform essential tasks and functions on a Linux system, managed using tools like systemd.
Read full term ->systemctl
Primary command-line utility for managing systemd services and targets.
Read full term ->tar
Archive utility for packaging files, often combined with compression tools.
Read full term ->top
Interactive process monitor showing CPU, memory, and runtime stats.
Read full term ->traceroute (Linux)
Linux utility that traces packet path toward a remote host.
Read full term ->UFW
UFW (Uncomplicated Firewall) is a user-friendly front-end for managing iptables firewall rules on Linux systems.
Read full term ->umask
Default permission mask applied to newly created files and directories.
Read full term ->User and Group Management
User and group management involves creating, modifying, and deleting user accounts and groups to control access and permissions on a Linux system.
Read full term ->useradd
Command for creating new local user accounts on Linux.
Read full term ->yum
Package manager used on older RPM-based Linux systems.
Read full term ->zypper
Package management command-line tool used in SUSE-based distributions.
Read full term ->
