CertNova
Menu
<- Back to glossary

CompTIA Linux+ (XK0-006) glossary

Terms selected for CompTIA Linux+ (XK0-006) based on common objective language and practice focus.

DNS

Domain Name System translates hostnames into IP addresses.

Read full term ->

RAID

RAID (Redundant Array of Independent Disks) is a storage technology that combines multiple disk drives into a single unit for redundancy or performance improvement.

Read full term ->

Virtual Machine

Software-defined computer running as an isolated guest system.

Read full term ->

Virtualization

The creation of a virtual version of something, such as an operating system, a server, a storage device, or network resources.

Read full term ->

Bash

Common Linux shell used for command execution and scripting.

Read full term ->

File Permissions

File permissions in Linux determine the access level users have to files and directories, including read, write, and execute rights.

Read full term ->

Linux Shell

Command interpreter used to run Linux commands and scripts.

Read full term ->

Multi-Factor Authentication (MFA)

MFA is a security process that requires users to provide multiple forms of identification before granting access to resources.

Read full term ->

Ansible

Automation platform used for configuration management and orchestration.

Read full term ->

Container Image

Packaged filesystem and runtime instructions used to create containers.

Read full term ->

Containerization

Application packaging method that bundles code and dependencies into isolated runtime units.

Read full term ->

Docker

Popular platform and tooling ecosystem for building and running containers.

Read full term ->

Hypervisor

Software layer that creates and manages virtual machines on physical hardware.

Read full term ->

Infrastructure as Code (IaC)

The practice of managing and provisioning computing infrastructure through machine-readable definition files, rather than physical hardware configuration.

Read full term ->

Kubernetes

Container orchestration platform for deploying, scaling, and managing containerized workloads.

Read full term ->

Octal

Base-8 number system using digits 0 through 7.

Read full term ->

apt

Package manager command interface for Debian-based Linux distributions.

Read full term ->

Backup and Restore

Backup and restore involve creating copies of data to prevent loss and recovering data from backups in case of failure.

Read full term ->

Boot Troubleshooting

Boot troubleshooting involves diagnosing and resolving issues that prevent a Linux system from starting correctly.

Read full term ->

chmod

Linux command used to modify file and directory permissions.

Read full term ->

chown

Linux command used to change file or directory ownership.

Read full term ->

CI/CD

CI/CD stands for Continuous Integration and Continuous Deployment, a practice that automates the integration and deployment of code changes.

Read full term ->

Container Engine

A container engine is software that allows the creation, management, and execution of containers, which are lightweight, portable application environments.

Read full term ->

CPU Architecture

CPU architecture refers to the design and functionality of a computer's central processing unit, determining how it processes data and executes instructions.

Read full term ->

cron

Time-based job scheduler for running commands at defined intervals.

Read full term ->

crontab

Per-user table defining scheduled cron tasks.

Read full term ->

TTY Console

Virtual text consoles available on Linux systems outside graphical sessions.

Read full term ->

Daemon

Background service process that provides system or application functionality.

Read full term ->

df

Command that reports filesystem disk space usage.

Read full term ->

dig

DNS lookup tool for querying records and troubleshooting name resolution.

Read full term ->

dnf

Package manager used on modern RPM-based Linux distributions.

Read full term ->

du

Command that estimates file and directory disk usage.

Read full term ->

File Encryption

File encryption is the process of converting data into a coded format to prevent unauthorized access.

Read full term ->

Filesystem

A filesystem is a method and data structure that an operating system uses to control how data is stored and retrieved.

Read full term ->

firewalld

Dynamic firewall management service commonly used on RHEL-family systems.

Read full term ->

/etc/fstab

Configuration file defining persistent filesystem mount behavior.

Read full term ->

Git Version Control

Distributed version control system used to track changes in code and configuration files used in network automation projects.

Read full term ->

grep

Text-search command for matching patterns in files and command output.

Read full term ->

groupadd

Command used to create new local groups on Linux.

Read full term ->

Hard Link

Directory entry pointing directly to an inode on the same filesystem.

Read full term ->

Inode

Filesystem metadata structure describing file attributes and block locations.

Read full term ->

Integrity Verification

Integrity verification involves checking data for alterations or corruption, ensuring that it remains unchanged and reliable.

Read full term ->

iptables

Legacy Linux packet filtering framework for firewall rule management.

Read full term ->

journalctl

Command for querying and viewing systemd journal logs.

Read full term ->

Kerberos

Kerberos is a network authentication protocol designed to provide strong authentication for client-server applications using secret-key cryptography.

Read full term ->

Kernel

The kernel is the core component of a Linux operating system, managing hardware resources and providing essential services to applications.

Read full term ->

Kernel Module

Loadable component extending Linux kernel capabilities without rebooting.

Read full term ->

LDAP

Directory access protocol used for querying and managing identity directory services.

Read full term ->

Linux Boot Process

The Linux boot process is the sequence of steps the system takes from powering on to loading the operating system and starting user space applications.

Read full term ->

LVM

Logical Volume Manager abstraction layer for flexible disk and volume management.

Read full term ->

modprobe

Utility that loads or removes kernel modules with dependency handling.

Read full term ->

mount

Command that attaches filesystems to the Linux directory tree.

Read full term ->

Network Interface

A network interface is a software or hardware component that connects a computer to a network, enabling communication with other devices.

Read full term ->

Network Troubleshooting

Network troubleshooting involves diagnosing and resolving connectivity issues in a network, ensuring reliable communication between devices.

Read full term ->

nftables

Modern Linux packet filtering framework replacing iptables in many distributions.

Read full term ->

nice

Command that launches processes with adjusted CPU scheduling priority.

Read full term ->

OS Hardening

OS hardening involves securing a Linux operating system by implementing best practices and configurations to reduce vulnerabilities.

Read full term ->

PAM

Pluggable Authentication Modules framework for Linux authentication policy.

Read full term ->

/etc/passwd

System file containing user account metadata and login shell information.

Read full term ->

Performance Tuning

The process of adjusting system parameters to improve the speed and efficiency of generative AI applications.

Read full term ->

Octal Permissions

Numeric Linux permission representation for owner, group, and others.

Read full term ->

PID

Process identifier assigned by the OS to each running process.

Read full term ->

Process Management

Process management in Linux involves monitoring and controlling active processes, including adjusting priorities and scheduling jobs.

Read full term ->

Puppet

Puppet is an open-source configuration management tool that automates the deployment and management of system configurations.

Read full term ->

Python Basics

Python basics cover fundamental programming concepts in Python, including data types, control structures, and functions.

Read full term ->

Python Virtual Environment

Isolated Python dependency environment for application-specific packages.

Read full term ->

mdadm

Linux utility for creating and managing software RAID arrays.

Read full term ->

renice

Command used to change scheduling priority of running processes.

Read full term ->

rsync

Efficient file synchronization tool transferring only changed data blocks.

Read full term ->

SELinux

Mandatory access control framework enforcing security policy labels on Linux.

Read full term ->

setgid

Permission bit affecting executable group privilege or directory group inheritance.

Read full term ->

setuid

Permission bit allowing executable files to run with owner privileges.

Read full term ->

SFTP

Secure file transfer protocol running over SSH.

Read full term ->

/etc/shadow

Protected system file containing password hashes and aging policy data.

Read full term ->

Shell Navigation

Shell navigation refers to the use of command-line interfaces to move through directories and manage files in a Linux environment.

Read full term ->

Shell Scripting

Shell scripting involves writing scripts using shell commands and syntax to automate tasks and processes on a Linux system.

Read full term ->

Software Package Management

Software package management involves installing, updating, and removing software applications using package managers like apt, yum, and zypper.

Read full term ->

SSH

Secure Shell protocol for encrypted remote command-line access.

Read full term ->

Sticky Bit

Directory permission control restricting file deletion to owners and privileged users.

Read full term ->

System Health Monitoring

System health monitoring involves tracking system performance metrics, such as CPU usage and memory consumption, to ensure optimal operation.

Read full term ->

System Services

System services are background processes that perform essential tasks and functions on a Linux system, managed using tools like systemd.

Read full term ->

systemctl

Primary command-line utility for managing systemd services and targets.

Read full term ->

tar

Archive utility for packaging files, often combined with compression tools.

Read full term ->

top

Interactive process monitor showing CPU, memory, and runtime stats.

Read full term ->

traceroute (Linux)

Linux utility that traces packet path toward a remote host.

Read full term ->

UFW

UFW (Uncomplicated Firewall) is a user-friendly front-end for managing iptables firewall rules on Linux systems.

Read full term ->

umask

Default permission mask applied to newly created files and directories.

Read full term ->

User and Group Management

User and group management involves creating, modifying, and deleting user accounts and groups to control access and permissions on a Linux system.

Read full term ->

useradd

Command for creating new local user accounts on Linux.

Read full term ->

yum

Package manager used on older RPM-based Linux systems.

Read full term ->

zypper

Package management command-line tool used in SUSE-based distributions.

Read full term ->
Start practice for XK0-006