(c)We Want to Hear from You



CompTIA Linux+/LPIC-1 Cert Guide

(Exams LX0-103 & LX0-400 & 102-400)

First Edition

Copyright © 2016 Pearson Education, Inc.

ISBN-10: 0-7897-5455-X

ISBN-13: 978-0-7897-5455-4

Warning and Disclaimer

Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information provided is on an "as is" basis. The author and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the CD or programs accompanying it.

When reviewing corrections, always check the print number of your book. Corrections are made to printed books with each subsequent printing.

First Printing: December 2015

Corrections for October 12, 2018

|Pg |Error – Third Printing |Correction |

|131 |2nd command line example from bottom up: chGRP |Should read: chgrp |

Corrections for March 10, 2017

|Pg |Error – Third Printing |Correction |

|126 |Chapter 5, Command to duplicate a USB |Should read: |

| |Reads: | |

| |dd if=/dev/sdc of=/dev/sdc |dd if=/dev/sdb of=/dev/sdc |

|178 |Chapter 6, Seventh Paragraph |Should read: |

| |Reads: | |

| |sed –n ‘1,5s/sever/SERVER/pg’ sedfile |sed –n ‘1,5s/sever/SERVER/pg’ sedfile |

| |The X SERVER uses this directory to store the complied version of the current |On the Exam, the sed questions are all about what will find and replace strings, with particular |

| |keymap and/or any scratch keymaps used by clients. The X SERVER |attention on global versus single replaces. |

| |Time. The default keymap for any SERVER is usually stored in: | |

| |On the Exam, the sed questions are all about what will find and replace strings, | |

| |with particular attention on global versus single replaces. | |

Corrections for January 16, 2017

|Pg |Error – Third Printing |Correction |

|622 |Appendix A, Chapter 2, Review Questions, Number 5, Last Sentence |Should read: |

| |Reads: | |

| |The other answers are incorrect because they don’t match the criteria and will |The other answers are incorrect because they don’t match the criteria and will either politely kill |

| |either politely kill the service (9) or abruptly kill the service (15). |the service (15) or abruptly kill the service (9). |

Corrections for November 11, 2016

|Pg |Error – Second Printing |Correction |

|184 |Chapter 6, Expanding grep with egrep and fgrep, Second Paragraph Command |Should read: |

| |Reads: | |

| |egrep '^r(p|t) /etc/passwd |egrep '^r(p|t) ' /etc/passwd |

Corrections for October 22, 2016

|Pg |Error – Second Printing |Correction |

|46 |Chapter 2, Third Paragraph, Command |Should read: |

| |Reads: | |

| |journalct1 -boot=cadadcadaff1dkljad1a1wdkfjpad1k |journalct1 - -boot=cadadcadaff1dkljad1a1wdkfjpad1k |

Corrections for August 24, 2016

|Pg |Error |Correction |

|176 |Chapter 6, First Command |Should read: |

| |Reads: | |

| |tr 'A-Z' a-z' < commands.txt |tr 'A-Z' 'a-z' < commands.txt |

|182 |Chapter 6, Last Paragraph, First Sentence |Should read: |

| |Reads: | |

| |And finally, let’s include a useful option to the grep command (grep -v) that |And finally, let’s include a useful option to the grep command (grep -l) that allows you to see not |

| |allows you to see not the normal output of lines that match the item you are |the normal output of lines that match the item you are searching for, but a listing of the files that|

| |searching for, but a listing of the files that match the search. |match the search. |

|204 |Chapter 7, Last Command After Last Paragraph |Should read: |

| |Reads: | |

| |renice +5 'pgrep chrome' |renice +5  `pgrep chrome` |

|220 |Chapter 8, Question 5, Answer d |Should read: |

| |Reads: | |

| |d. a10yy |d. "a10yy |

|237 |Chapter 8, Question 4, Answer a |Should read: |

| |Reads: | |

| |vim +set number" mytestfile.txt |vim +"set number" mytestfile.txt |

Corrections for March 18, 2016

|Pg |Error |Correction |

|119 |Chapter 5, Third Paragraph, First Sentence |Should read: |

| |Reads: | |

| |In the output, the first command shows there are three files with an extension of|In the output, the first command shows there are two files with an extension of foo and none of bar. |

| |foo and none of bar. | |

|156 |Chapter 6, Fourth Bullet Point |Should read: |

| |Reads: | |

| |2> —Redirects stderr to a file, appending the current stream to the end of the |2>> —Redirects stderr to a file, appending the current stream to the end of the file, rather than |

| |file, rather than overwriting the file contents. This is a modifier of the > or |overwriting the file contents. This is a modifier of the > or 2> output redirection descriptor. |

| |2> output redirection descriptor. | |

|162 |Chapter 6, First Key Topic, Second Sentence |Should read: |

| |Reads: | |

| |Substituting the output of a command for the command itself is accomplished by | |

| |bracketing the command with the backtick (`), aka the unshifted tilde (~) key, |Substituting the output of a command for the command itself is accomplished by bracketing the command|

| |like so: |with the backtick (`), aka the unshifted tilde (~) key, like so: |

| |'somecmd' |`somecmd` |

|162 |Chapter 6, First Key Topic, Second Paragraph, First command |Should read: |

| |Reads: | |

| |export DATETIME='date' |export DATETIME=`date` |

|165 |Chapter 6, Filters, Fourth Paragraph, First Command |Should read: |

| |Reads: | |

| |sort +1 file1 |sort -k2 file1 |

|168 |Chapter 6, Cutting Columns, Second Paragraph |Should read: |

| |Reads: | |

| |This displays only from column 20 to column 40 of file1, excluding all other data|This displays only from column 20 to column 40 of /etc/passwd, excluding all other data on each line.|

| |on each line. | |

|202 |Chapter 7, Table 7-2, Second Signal |Should read: |

| |Reads: | |

| |SIGHUP 6 Hang up or shut down and restart process |SIGHUP 1 Hang up or shut down and restart process |

|202 |Chapter 7, Table 7-2, Sixth Signal |Should read: |

| |Reads: | |

| |SIGSTOP 23 Stop execution (cannot be caught or ignored) |SIGSTOP 19 Stop execution (cannot be caught or ignored) |

|371 |Chapter 13, Using SQLite, First Sentence |Should read: |

| |Reads: | |

| |SQL is an embedded database rather than a network-aware database. |SQLite is an embedded database rather than a network-aware database. |

|411 |Chapter 14, Mouse Keys, Second Sentence |Should read: |

| |Reads: | |

| |On the number pad, keys 1-4 and 6-8 represent directions to move the mouse. |On the number pad, keys 2-4 and 8-6 represent directions to move the mouse. |

|413 |Chapter 14, Key Topic, Second Bullet |Should read: |

| |Reads: | |

| |xhost -—Enables |xhost - —Enables |

|430 |Chapter 15, Example 15-1, Ninth Command |Should read: |

| |Reads: | |

| |[root@server1 ~]# useradd tim |[root@server1 ~]# useradd -m tim |

|434 |Chapter 15, Fourth Paragraph, Second Command |Should read: |

| |Reads: | |

| |useradd –u 1002 –d /hom/sarah sarah |useradd –u 1002 –d /home/sarah sarah |

|531 |Chapter 19, “Do I Know This Already?” Quiz, Question 8 |Should read: |

| |Reads: | |

| |8. Which command allow you to request an IP address as a DNS client? |8. Which command allow you to request an IP address as a DHCP client? |

|535 |Chapter 19, Key Topic, First Bullet Point |Should read: |

| |Reads: | |

| |A —From 1 to 126; each of these permits up to 16,777,216 host addreses. |A —From 1 to 126; each of these permits up to 16,777,214 host addreses. (minus 2! ID and Broadcast) |

|535 |Chapter 19, Key Topic, Second Bullet Point |Should read: |

| |Reads: | |

| |B —From 128 to 191; each of these permits up to 65,536 host addresses. |B —From 128 to 191; each of these permits up to 65,534 host addresses. (minus 2! ID and Broadcast) |

|539 |Chapter 19, Number 5 |Should read: |

| |Reads: | |

| |5. Start at 0 and use the LSB (least significant bit) or 32 as the increment for |5. Start at 0 and use the LSB (least significant bit) or 32 as the increment for the networks (keep |

| |the networks (keep in mind that a network’s 0 and 224 might be network and |in mind that a network’s 0 and 224 might be network and broadcast addresses and thus invalid for use.|

| |broadcast addresses and thus invalid for use, depending on your networking | |

| |hardware.) | |

|555 |Chapter 19, The ifconfig Command, First Paragraph, Second Sentence |Should read: |

| |Reads: | |

| |You can set everything but the default gateway with this command, including the |You can set everything like the default gateway with this command, including the bringing up or |

| |bringing up or activation of the interface. |activation of the interface. |

|590 |Chapter 20, Second Paragraph, First Sentence |Should read: |

| |Reads: | |

| |To encrypt a file and send to another person, you first should export your public|To encrypt a file and send to another person, you first should import the recipient public key to a |

| |key to a file. |file. |

|641 |Appendix A, Chapter 12, Review Questions, Answer 7, Fourth Sentence |Should read: |

| |Reads: | |

| |C is not correct because until loops until a condition is true. |D is not correct because until loops until a condition is true. |

Corrections for January 15, 2016

|Pg |Error |Correction |

|xxvi |Frontmatter, How This Book is Organized, Second Paragraph |Should read: |

| |Reads: | |

| |Chapter 1 through 12 cover the following topics: |Chapter 1 through 21 cover the following topics: |

|185 |Chapter 6, Second Set of Commands, Second Command |Should read: |

| |Reads: | |

| |fgrep –f searchterms.txt foobartar.fu |fgrep –f searchterms.txt filetosearch.txt |

This errata sheet is intended to provide updated technical information. Spelling and grammar misprints are updated during the reprint process, but are not listed on this errata sheet.

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download