LFCS Certification exam LFCS Certification exam

articles

LFCS Certification exam from feb 2016

The LFCS exam gets updated with new Domains and Competences v 2.16 from 2 feb 2016 . After feb new exam as well as retakes exam will follow the same updated syllabus which is listed below

LFCS Syllabus

ESSENTIAL COMMANDS - 25%

Identify the component of the Linux distribution that a file belongs to

Install Linux Distribution to physical media

Install Linux Distribution over a network

Install Linux Distribution into a virtual disk image

Log into graphical and text mode consoles

Search for files

Evaluate and compare the basic file system features and options

Compare text files

Compare binary files

Identify different types of files

Create and edit text files

Use input-output redirection (e.g. >, >>, |, 2>)

Analyze text using basic regular expressions

Access remote systems securely using CLI

Archive, compress, unpack, and uncompress files

Create, delete, copy, and move files and directories

Create hard and soft links

List, set, and change standard file permissions

Read, and use system documentation

Manipulate file content programmatically

Transfer files securely via the network

Manage access to the root account

Perform disk image management

Use version control tools

Run commands on many systems simultaneously

Operation of Running Systems - 20%

Boot, reboot, and shut down a system safely

Boot systems into different runlevels manually

Install, configure and troubleshoot the bootloader

Manage shared libraries

Change the priority of a process

Identify resource utilization by process

Locate and analyze system log files

Schedule tasks to run at a set date and time

Verify completion of scheduled jobs

Manipulate Linux system during the boot process

Manipulate Linux system during the recovery process

Support incident management for outages/trouble

Identify and resolve system performance bottlenecks and platform instability

Update hardware to provide required functionality and security

Update operating systems to provide required functionality and security

Update software to provide required functionality and security

Update the kernel and ensure the system is bootable

Verify the integrity and availability of hardware

Verify the integrity and availability of resources

Verify the integrity and availability of key processes

Change kernel runtime parameters, persistent and non-persistent

Use scripting to automate system maintenance tasks

Manage the startup process and services

List and identify SELinux/AppArmor file and process contexts

Produce and deliver reports on system use (processor, memory, disk, and network), outages, and user requests

Update packages from the network, a remote repository, or from the local file system

Configure and modify SELinux/AppArmor policies

Monitor security and conduct audits

Script automation tools to make work faster and more accurate

Develop and test disaster recovery plans

Maintain systems via configuration management tools

Train team members on new technology or changes to existing systems

Develop system disaster recovery tests

Install software from source

User and Group Management - 15%

Create, delete, and modify local user accounts

Create, delete, and modify local groups and group memberships

Manage system-wide environment profiles

Configure a client to use LDAP for user and group information

Configure a system to authenticate using Kerberos

Configure set-GID directories for collaboration

Manage template user environment

Configure user resource limits

Manage user processes

Configure PAM

Networking - 15%

Configure networking and hostname resolution statically or dynamically

Configure network services to start automatically at boot

Implement packet filtering

Configure firewall settings

Configure a system to perform Network Address Translation

Start, stop, and check the status of network services

Monitor network performance

Statically route IP traffic

Dynamically route IP traffic

Synchronize time using other network peers

Configure network traffic tunneling

Service Configuration - 10%

Configure a basic DNS server

Maintain a DNS zone

Configure a caching-only name server

Configure a caching-only name server to forward DNS queries

Configure an FTP server

Configure anonymous-only download on FTP servers

Provide/configure network shares via NFS

Provide/configure network shares via CIFS

Configure an smtp service

Restrict access to an smtp server

Configure a mail transfer agent (MTA) to accept inbound email from other systems

Configure an MTA to forward (relay) email through a smart host

Configure email aliases

Configure SSH servers and clients

Configure SSH-based remote access using public/private key pairs

Configure a DHCP server

Configure the HTTP proxy server

Restrict access to the HTTP proxy server

Configure an HTTP client to automatically use a proxy server

Configure an IMAP and IMAPS service

Configure host-based and user-based security for a service

Query and modify the behavior of system services at various run levels

Configure direct-attach and network printers

Configure an HTTP server

Configure HTTP server log files

Configure SSL with HTTP server

Set up name-based virtual web hosts

Deploy a basic web application

Restrict access to a web page

Configure time synchronization server

Synchronize time using other time synchronization peers

Configure a system to log to a remote system

Configure a PXE Boot server

Configure an LDAP server and schema

Configure a system to accept logging from a remote system

Diagnose routine SELinux/AppArmor policy violations

Configure SELinux/AppArmor to support a service

Configure database server

Configure SELinux/AppArmor to confine a service

Virtualization - 5%

Configure a hypervisor to host virtual guests

Install Linux systems as virtual guests

Start, stop, modify the status of virtual machines

Access a VM console

Migrate a VM between two hosts

Configure systems to launch virtual machines at boot

Evaluate memory usage of virtual machines

Create light-weight virtualized guests via namespaces

Resize RAM or storage of VMs

Cloning and replicating VMs using images or snapshots

Storage Management - 10%

List, create, delete, and modify storage partitions

Create, migrate, and remove Physical Volumes

Assign Physical Volumes to Volume Groups

Create, modify and delete Logical Volumes

Extend existing Logical Volumes and filesystems

Create and configure encrypted partitions

Configure systems to mount file systems at or during boot

Configure and manage swap space

Add new partitions, and logical volumes

Create, mount, and unmount standard Linux file systems

Assemble partitions as RAID devices

Identify storage devices using block device attributes

Configure systems to mount standard, encrypted, and network file systems on demand

Create and manage filesystem Access Control Lists (ACLs)

Diagnose and correct file permission problems

Setup user and group disk quotas for filesystems

Restore default SELinux file contexts

Manage Linux file system features and flags

Configure remote block storage devices

Design and test backup/recovery strategies

Deploy, configure, and maintain high availability/clustering/replication

© 2015 by Learncertification All Rights Reserved. The certification names are the trademarks of their respective owners. Terms & Privacy Policy