System Management - 23%
 | 
| 
				Explain basic Linux concepts. | 
				- Basic boot process
- 
						Bootloader
 
						- Configuration files 
- 
						Kernel
 
						- Parameters 
- 
						Initial RAM [random-access memory] disk (initrd)
 
- 
						Preboot Execution Environment (PXE)
 
 
				- Filesystem Hierarchy Standard (FHS) 
- 
						/
 
- 
						/bin
 
- 
						/boot
 
- 
						/dev
 
- 
						/etc
 
- 
						/home
 
- 
						/lib
 
- 
						/proc
 
- 
						/sbin
 
- 
						/tmp
 
- 
						/usr
 
- 
						/var
 
 
				- Server architectures 
- 
						AArch64
 
- 
						Reduced instruction set computer, version five (RISC-V)
 
- 
						x86
 
- 
						x86_64/AMD64
 
 
				- Distributions 
- 
						RPM Package Manager (RPM)-based
 
- 
						Debian packet manager (dpkg)-based
 
 
				- Graphical User Interface (GUI) 
- 
						Display managers
 
- 
						Window managers
 
- 
						X Server
 
- 
						Wayland
 
 
				- Software licensing 
- 
						Opensource software
 
- 
						Free software
 
- 
						Proprietary software
 
- 
						Copyleft
 
 
 | 
| 
				Summarize Linux device management concepts and tools. | 
				- Kernel modules
- 
						depmod
 
- 
						insmod
 
- 
						lsmod
 
- 
						modinfo
 
- 
						modprobe
 
- 
						rmmod
 
 
				- Device management 
- 
						dmesg
 
- 
						dmidecode
 
- 
						ipmitool
 
- 
						lm_sensors
 
- 
						lscpu
 
- 
						lshw
 
- 
						lsmem
 
- 
						lspci
 
- 
						lsusb
 
 
				- initrd management 
				- Custom hardware 
- 
						Embedded systems
 
- 
						Graphics Processing Unit (GPU) use cases
 
						-& nvtop 
 
 | 
| 
				Given a scenario, manage storage in a Linux system. | 
				- Logical Volume Manager (LVM)
- 
						Logical volume
 
						- lvchange 
						- lvcreate 
						- lvdisplay 
						- lvremove 
						- lvresize/lvextend 
						- lvs 
 
				- Volume group 
- 
						vgchange
 
- 
						vgcreate
 
- 
						vgdisplay
 
- 
						vgexport
 
- 
						vgextend
 
- 
						vgimport
 
- 
						vgremove
 
- 
						vgs
 
- 
						vgscan
 
 
				- Physical volume 
- 
						pvcreate
 
- 
						pvdisplay
 
- 
						pvmove
 
- 
						pvremove
 
- 
						pvresize
 
- 
						pvs
 
- 
						pvscan
 
 
				- Partitions 
- 
						blkid
 
- 
						fdisk/gdisk
 
- 
						growpart
 
- 
						lsblk
 
- 
						parted
 
 
				- Filesystems 
- 
						Formats
 
						- xfs 
						- ext4 
						- btrfs 
						- tmpfs 
 
				- Utilities 
- 
						df
 
- 
						du
 
- 
						fio
 
- 
						fsck
 
- 
						mkfs
 
- 
						resize2fs
 
- 
						xfs_growfs
 
- 
						xfs_repair
 
 
				- Redundant Array of Independent Disks (RAID) 
				- Mounted storage 
- 
						Mounting
 
						- /etc/fstab 
						- /etc/mtab 
						- /proc/mounts 
						- autofs 
						- mount 
						- umount 
- 
						Mount options
 
						- noatime 
						- nodev 
						- nodiratime 
						- noexec 
						- nofail 
						- nosuid 
						- remount 
						- ro 
						- rw 
- 
						Network mounts
 
						- Network file system (NFS) 
						- Server Message Block (SMB) Samba 
 
				- Inodes  | 
| 
				Given a scenario, manage network services and configurations on a Linux server. | 
				- Network configuration
- 
						/etc/hosts
 
- 
						/etc/resolv.conf
 
- 
						/etc/nsswitch.conf
 
 
				- NetworkManager 
				- Netplan 
- 
						netplan apply
 
- 
						netplan status
 
- 
						netplan try
 
						- Configuration files 
						1. /etc/netplan 
 
				- Common network tools 
- 
						arp
 
- 
						curl
 
- 
						dig
 
- 
						ethtool
 
- 
						hostname
 
- 
						ip
 
						- ip address 
						- ip link 
						- ip route 
- 
						iperf3
 
- 
						mtr
 
- 
						nc
 
- 
						nmap
 
- 
						nslookup
 
- 
						ping/ping6
 
- 
						ss
 
- 
						tcpdump
 
- 
						tracepath
 
- 
						traceroute
 
 
 | 
| 
				Given a scenario, manage a Linux system using common shell operations. | 
				- Common environmental variables
- 
						DISPLAY
 
- 
						HOME
 
- 
						PATH
 
- 
						PS1
 
- 
						SHELL
 
- 
						USER
 
 
				- Paths 
				- Relative 
				- Shell environment configurations 
- 
						.bashrc
 
- 
						.bash_profile
 
- 
						.profile
 
 
				- Channel redirection 
- 
						<
 
- 
						>
 
- 
						<<
 
- 
						>>
 
- 
						|
 
- 
						Standard output
 
- 
						Standard error
 
- 
						Standard input
 
- 
						Here docs
 
						- <<< 
 
				- Basic shell utilities 
- 
						!
 
- 
						!!
 
- 
						alias
 
- 
						awk
 
- 
						bc
 
- 
						cat
 
- 
						cut
 
- 
						echo
 
- 
						grep
 
- 
						head
 
- 
						history
 
- 
						less
 
- 
						more
 
- 
						printf
 
- 
						sed
 
- 
						sort
 
- 
						source
 
- 
						tail
 
- 
						tee
 
- 
						tr
 
- 
						uname
 
- 
						uniq
 
- 
						wc
 
- 
						xargs
 
 
				- Text editors 
 | 
| 
				Given a scenario, perform backup and restore operations for a Linux server. | 
				- Archiving
 				- Compression tools 
- 
						7-Zip
 
- 
						bzip2
 
- 
						gzip
 
- 
						unzip
 
- 
						xz
 
 
				- Other tools 
- 
						dd
 
- 
						ddrescue
 
- 
						rsync
 
- 
						zcat
 
- 
						zgrep
 
- 
						zless
 
 
 | 
| 
				Summarize virtualization on Linux systems. | 
				- Linux hypervisors
- 
						Quick Emulator (QEMU)
 
- 
						Kernel-based Virtual Machine (KVM)
 
 
				- Virtual machines (VMs) 
- 
						Paravirtualized drivers
 
- 
						VirtIO
 
- 
						Disk image operations
 
						- Convert 
						- Resize 
						- mage properties 
- 
						VM states
 
- 
						Nested virtualization
 
 
				- VM operations 
- 
						Resources
 
						- Storage 
						- RAM 
						- Central processing unit (CPU) 
						Network 
- 
						Baseline image templates
 
- 
						Cloning
 
- 
						Migrations
 
- 
						Snapshots
 
 
				- Bare metal vs. virtual machines 
				- Network types 
- 
						Bridged
 
- 
						Network address translation (NAT)
 
- 
						Host-only/isolated
 
- 
						Routed
 
- 
						Open
 
 
				- Virtual machine tools 
- 
						libvirt
 
- 
						virsh
 
- 
						vit-manager
 
 
 | 
					Services and User Management - 20%
 | 
| 
				Given a scenario, manage files and directories on a Linux system. | 
				- Utilities
- 
						cd
 
- 
						cp
 
- 
						diff
 
- 
						file
 
- 
						find
 
- 
						ln
 
- 
						locate
 
- 
						ls
 
- 
						lsof
 
- 
						mkdir
 
- 
						mv
 
- 
						pwd
 
- 
						rm
 
- 
						rmdir
 
- 
						sdiff
 
- 
						stat
 
- 
						touch
 
 
				- Links 
				- Device types in /dev 
- 
						Block devices
 
- 
						Character devices
 
- 
						Special character devices
 
 
 | 
| 
				Given a scenario, perform local account management in a Linux environment. | 
				- Add
 				- Delete 
				- Modify 
- 
						chsh
 
- 
						groupmod
 
- 
						passwd
 
- 
						usermod
 
 
				- Lock 
				- Expiration 
- 
						Configuration files
 
- 
						chage
 
 
				- List 
- 
						getent passwd
 
- 
						groups
 
- 
						id
 
- 
						last
 
- 
						lastlog
 
- 
						w
 
- 
						who
 
- 
						whoami
 
 
				- User profile templates 
				- Account files 
- 
						/etc/group
 
- 
						/etc/passwd
 
- 
						/etc/shadow
 
 
				- Attributes 
- 
						Unique Identifier (UID)
 
- 
						Group Identifier (GID)
 
- 
						Effective User Identifier (EUID)
 
- 
						Effective Group Identifier (EGID)
 
 
				- User accounts vs. system accounts vs. service accounts 
 | 
| 
				Given a scenario, manage processes and jobs in a Linux environment. | 
				- Process verification
- 
						/proc/<PID>
 
- 
						atop
 
- 
						htop
 
- 
						lsof
 
- 
						mpstat
 
- 
						pidstat
 
- 
						ps
 
- 
						pstree
 
- 
						strace
 
- 
						top
 
 
				- Process ID 
- 
						Parent Process Identification Number (PPID)
 
- 
						Process Identification Number (PID)
 
 
				- Process states 
- 
						Running
 
- 
						BCompTIA Linux+ (Linux Plus) Exam SyllabusCompTIA Linux+ (Linux Plus) Exam Syllabuslocked
 
- 
						Sleeping
 
- 
						Stopped
 
- 
						Zombie
 
 
				- Priority 
				- Process limits 
				- Job and process management 
- 
						&
 
- 
						bg
 
- 
						Ctrl + c
 
- 
						Ctrl + d
 
- 
						Ctrl + z
 
- 
						exec
 
- 
						fg
 
- 
						jobs
 
- 
						kill
 
- 
						killall
 
- 
						nohup
 
- 
						pkill
 
- 
						Signals
 
						- 1 HUP 
						- 9 KILL 
						- 15 TERM 
 
				- Scheduling 
 | 
| 
				Given a scenario, configure and manage software in a Linux environment. | 
				- Installation, update, and removal
- 
						Repository
 
- 
						Source
 
- 
						Package dependencies and conflicts
 
- 
						Package managers
 
- 
						Language-specific
 
						- pip 
						- cargo 
						- npm 
 
				- Repository management 
- 
						Enabling/disabling
 
- 
						Third party
 
- 
						Gnu’s Not Unix (GNU) Privacy Guard (GPG) signatures
 
 
				- Package and repository exclusions 
				- Update alternatives 
				- Software configuration 
				- Sandboxed applications 
				- Basic configurations of common services 
- 
						Domain Name System (DNS) protocol
 
- 
						Network Time Protocol (NTP)/ Precision Time Protocol (PTP)
 
- 
						Dynamic Host Configuration Protocol (DHCP)
 
- 
						HyperText Transfer Protocol (HTTP)
 
						- Apache HTTP Server (httpd) 
						- Nginx 
- 
						Simple Mail Transfer Protocol (SMTP)
 
- 
						Internet Messaging Access Protocol (IMAP4)
 
 
 | 
| 
				Given a scenario, manage Linux using systemd. | 
				- Systemd units
- 
						Services
 
- 
						Timers
 
- 
						Mounts
 
- 
						Targets
 
 
				- Utilities 
- 
						hostnamectl
 
- 
						resolvectl
 
- 
						sysctl
 
- 
						systemctl
 
- 
						systemd-analyze
 
- 
						systemd-blame
 
- 
						systemd-resolved
 
- 
						timedatectl
 
 
				- Managing unit states 
- 
						daemon-reload
 
- 
						disable
 
- 
						edit
 
- 
						enable
 
- 
						mask
 
- 
						reload
 
- 
						restart
 
- 
						start
 
- 
						status
 
- 
						stop
 
- 
						unmask
 
 
 | 
| 
				Given a scenario, manage applications in a container on a Linux server. | 
				- Runtimes
- 
						runC
 
- 
						Podman
 
- 
						containerd
 
- 
						Docker
 
 
				- Image operations 
- 
						Pulling images
 
- 
						Build an image
 
						- Dockerfile 
						1. ENTRYPOINT 
						2. CMD 
						3. USER 
						4. FROM 
- 
						Pruning
 
- 
						Tags
 
- 
						Layers
 
 
				- Container operations 
- 
						Read container logs
 
- 
						Map container volumes
 
- 
						Start/stop containers
 
- 
						Inspect containers
 
- 
						Delete a container
 
- 
						Run
 
- 
						Exec
 
- 
						Pruning
 
- 
						Tags
 
- 
						Environmental variables
 
 
				- Volume operations 
- 
						Create volume
 
- 
						Mapping volume
 
- 
						Pruning
 
- 
						SELinux context
 
- 
						Overlay
 
 
				- Container networks 
- 
						Create network
 
- 
						Port mapping
 
- 
						Pruning
 
- 
						Types
 
						- macvlan 
						- ipvlan 
						- Host 
						- Bridge 
						- Overlay 
						- None 
 
				- Privileged vs. unprivileged  | 
					Security - 18%
 | 
| 
				Summarize authorization, authentication, and accounting methods. | 
				- Polkit 
				- Pluggable Authentication Modules (PAM) 
				- System Security Services Daemon (SSSD)/Winbind realm 
				- Lightweight Directory Access Protocol (LDAP) 
				- Kerberos 
				- Samba 
				- Logging
- 
						journalctl
 
- 
						rsyslog
 
- 
						logrotate
 
- 
						/var/log
 
 
				- System audit 
 | 
| 
				Given a scenario, configure and implement firewalls on a Linux system. | 
				- firewalld
- 
						firewall-cmd
 
- 
						Runtime vs. permanent
 
- 
						Rich rules
 
- 
						Zones
 
- 
						Ports vs. services
 
 
				- Uncomplicated Firewall (ufw) 
				- nftables 
				- iptables 
				- ipset 
				- Netfilter module 
				- Address translation 
- 
						NAT
 
- 
						Port Address Translation (PAT)
 
- 
						Destination Network Address Translation (DNAT)
 
- 
						Source Network Address Translation (SNAT)
 
 
				- Stateful vs. stateless 
				- Internet rotocol (IP) forwarding 
 | 
| 
				Given a scenario, apply operating system (OS) hardening techniques on a Linux system. | 
				- Privilege escalation
- 
						sudo
 
						- /etc/sudoers 
						1. NOEXEC 
						2. NOPASSWD implications 
						- /etc/sudoers.d 
						- visudo 
						- sudo -i 
						- wheel group 
						- sudo group 
- 
						su -
 
 
				- File attributes 
- 
						chattr
 
- 
						lsattr
 
						- immutable 
						- append only 
 
				- Permissions 
- 
						File permissions
 
						- chgrp 
						- chmod 
						1. Octal 
						2. Symbolic 
						- chown 
- 
						Special permissions
 
						- Sticky bit 
						- setuid 
						- setgid 
- 
						Default user file-creation mode mask (umask)
 
 
				- Access control 
- 
						Access control lists (ACLs)
 
						- setfacl 
						- getfacl 
- 
						SELinux
 
						- restorecon 
						- semanage 
						- chcon 
						- ls -Z 
						- getenforce 
						- setenforce 
						- getsebool 
						- setsebool 
						- audit2allow 
						- sealert 
						- States 
						1. Enforcing 
						2. Permissive 
						3. Disabled 
 
				- Secure remote access 
- 
						Secure Shell daemon (SSHD)
 
						- Key vs. password authentication 
						- Secure Shell (SSH) tunneling 
						- PermitRootLogin 
						- Disabling X forwarding 
						- AllowUsers 
						- AllowGroups 
- 
						SSH agent
 
- 
						Secure File Transfer Protocol (SFTP)
 
						- chroot 
- 
						fail2ban
 
 
				- Avoid the use of unsecure access services 
				- Disabling unused file systems 
				- Removal of unnecessary Set User ID (SUID) permissions 
				- Secure boot 
- 
						Unified Extensible Firmware Interface (UEFI)
 
 
 | 
| 
				Explain account hardening techniques and best practices. | 
				- Passwords
- 
						Complexity
 
- 
						Length
 
- 
						Expiration
 
- 
						Reuse
 
- 
						History
 
 
				- Multifactor authentication (MFA) 
				- Checking existing breach lists 
				- Restricted shells 
				- pam_tally2 
				- Avoid running as root  | 
| 
				Explain cryptographic concepts and technologies in a Linux environment. | 
				- Data at rest
- 
						File encryption
 
						- GPG 
- 
						Filesystem encryption
 
						- Linux Unified Key Setup 2 (LUKS2) 
						- Argon2 
 
				- Data in transit 
- 
						Open Secure Sockets Layer (OpenSSL)
 
- 
						WireGuard
 
- 
						LibreSSL
 
- 
						Transport Layer Security (TLS) protocol versions
 
 
				- Hashing 
- 
						SHA-256
 
- 
						Hashed message authentication code (HMAC)
 
 
				- Removal of weak algorithms 
				- Certificate management 
- 
						Trusted root certificates
 
						- No-cost 
						- Commercial 
 
				- Avoiding self-signed certificates  | 
| 
				Explain the importance of compliance and audit procedures. | 
				- Detection and response
- 
						Anti-malware
 
- 
						Indicators of compromise (IOC)
 
 
				- Vulnerability scanning 
- 
						Common Vulnerabilities and Exposures (CVEs)
 
- 
						Common Vulnerability Scoring System (CVSS)
 
- 
						Backporting patches
 
- 
						Service misconfigurations
 
- 
						Tools
 
						- Port scanners 
						- Protocol analyzer 
 
				- Standards and audit 
- 
						Open Security Content Automation Protocol (OpenSCAP)
 
- 
						Center for Internet Security (CIS) Benchmarks
 
 
				- File integrity 
- 
						Advanced Intrusion Detection Environment (AIDE)
 
- 
						Rootkit hunter (rkhunter)
 
- 
						Signed package verification
 
- 
						Installed file verification
 
 
				- Secure data destruction 
- 
						shred
 
- 
						badblocks -w
 
- 
						dd if=/dev/urandom
 
- 
						Cryptographic destruction
 
 
				- Software supply chain 
				- Security banners 
- 
						/etc/issue
 
- 
						/etc/issue.net
 
- 
						/etc/motd
 
 
 | 
					Automation, Orchestration, and Scripting - 17%
 | 
| 
				Summarize the use cases and techniques of automation and orchestration in a Linux environment. | 
				- Infrastructure as code
- 
						Ansible
 
						- Playbooks 
						- Inventory 
						- Modules 
						- Ad hoc 
						- Collections 
						- Facts 
						- Agentless 
- 
						Puppet
 
						- Classes 
						- Certificates 
						- Modules 
						- Facts 
						- Agent/Agentless 
- 
						OpenTofu
 
						- Provider 
						- Resource 
						- State 
						- Application programming interface (API) 
 
				- Unattended deployment 
				- Continuous integration/ Continuous deployment (CI/CD) 
- 
						Version control
 
- 
						Shift left testing
 
- 
						GitOps
 
- 
						Pipelines
 
- 
						DevSecOps
 
 
				- Deployment orchestration 
- 
						Kubernetes
 
						- ConfigMaps 
						- Secrets 
						- Pods 
						- Deployments 
						- Volumes 
						- Services 
						- Variables 
- 
						Docker Swarm
 
						- Service 
						- Nodes 
						- Tasks 
						- Networks 
						- Scale 
- 
						Docker/Podman Compose
 
						- Compose file 
						- Up/down 
						- Logs 
 
 | 
| 
				Given a scenario, perform automated tasks using shell scripting. | 
				- Expansion
- 
						Parameter expansion
 
						- ${var} 
- 
						Command substitution
 
						- $(foo) 
- 
						Subshell
 
						- (foo) 
 
				- Functions 
				- Internal Field Separator/Output Field Separator (IFS/OFS) 
				- Conditional statements 
				- Looping statements 
				- Interpreter directive 
				- Comparisons 
- 
						Numerical
 
						1. -eq 
						2. -ge 
						3. -gt 
						4. -le 
						5. -lt 
						6. -ne 
- 
						String
 
						1. > 
						2. < 
						3. == 
						4. = 
						5. = ~ 
						6. ! = 
						7. <= 
						8. >= 
 
				- Regular expressions 
				- Test 
				- Variables 
- 
						Environmental
 
- 
						Arguments
 
- 
						Assignments
 
						- alias 
						- export 
						- local 
						- set 
						- unalias 
						- unset 
- 
						Return codes
 
						- $? 
 
 | 
| 
				Summarize Python basics used for Linux system administration. | 
				- Setting up a virtual environment 
				- Built-in modules 
				- Installing dependencies 
				- Python fundamentals
- 
						Indentations
 
- 
						Current versions
 
- 
						Data types and structures
 
						- Boolean 
						- Dictionary 
						- Floating point 
						- Integer 
						- List 
						- String 
- 
						Extensible using modules and packages
 
 
				- Python Enhancement Proposal (PEP) 8 best practices  | 
| 
				Given a scenario, implement version control using Git. | 
				- .gitignore 
				- add 
				- branch 
				- checkout 
				- clone 
				- commit 
				- config 
				- diff 
				- fetch 
				- init 
				- log 
				- merge
				- pull 
				- push 
				- rebase 
				- reset 
				- stash 
				- tag  | 
| 
				Summarize best practices and responsible uses of artificial intelligence (AI). | 
				- Common use cases
- 
						Generation of code
 
- 
						Generation of regular expressions
 
- 
						Generation of infrastructure as code
 
- 
						Document code/create documentation
 
- 
						Recommendations for how to improve compliance
 
- 
						Security review
 
- 
						Code optimization
 
- 
						Code linting
 
 
				- Best practices 
- 
						Avoid copy/paste without review/quality assurance
 
- 
						Verify output
 
- 
						Data governance
 
						- Security of data 
						1. Large language model (LLM) training 
						2. Human review 
						- Local models 
						1. Private vs. public 
- 
						Adhere to corporate policy
 
 
				- Prompt engineering  | 
					Troubleshooting - 22%
 | 
| 
				Summarize monitoring concepts and configurations in a Linux system. | 
				- Service monitoring
- 
						Service-level agreement (SLA)
 
- 
						Service-level indicator (SLI)
 
- 
						Service-level objective (SLO)
 
 
				- Data acquisition methods 
- 
						Simple Network Management Protocol (SNMP)
 
						- Traps 
						- Management information bases (MIBs) 
- 
						Agent/agentless
 
- 
						Webhooks
 
- 
						Health checks
 
- 
						Log aggregation
 
 
				- Configurations 
- 
						Thresholds
 
- 
						Alerts
 
- 
						Events
 
- 
						Notifications
 
- 
						Logging
 
 
 | 
| 
				Given a scenario, analyze and troubleshoot hardware, storage, and Linux OS issues. | 
				- Common issues
- 
						Kernel panic
 
- 
						Data corruption issues
 
- 
						Kernel corruption issues
 
- 
						Package dependency issues
 
- 
						Filesystem will not mount
 
- 
						Server not turning on
 
- 
						OS filesystem full
 
- 
						Server inaccessible
 
- 
						Device failure
 
- 
						Inode exhaustion
 
- 
						Partition not writable
 
- 
						Segmentation fault
 
- 
						Grand Unified Bootloader (GRUB) misconfiguration
 
- 
						Killed processes
 
- 
						PATH misconfiguration issues
 
- 
						Systemd unit failures
 
- 
						Missing or disabled drivers
 
- 
						Unresponsive process
 
- 
						Quota issues
 
- 
						Memory leaks
 
 
 | 
| 
				Given a scenario, analyze and troubleshoot networking issues on a Linux system. | 
				- Common issues
- 
						Misconfigured firewalls
 
- 
						DHCP issues
 
- 
						DNS issues
 
- 
						Interface misconfiguration
 
						- Maximum transmission unit (MTU) mismatch 
						- Bonding 
						- Media access control (MAC) spoofing 
						- Subnet 
						- Cannot ping server 
- 
						Routing issues
 
						- Gateway 
- 
						Server unreachable
 
- 
						IP conflicts
 
- 
						Dual stack issues (IPv4 and IPv6)
 
- 
						Link down
 
- 
						Link negotiation issues
 
 
 | 
| 
				Given a scenario, analyze and troubleshoot security issues on a Linux system. | 
				Common issues
- 
						SELinux issues
 
						- Policy 
						- Context 
						- Booleans 
- 
						File and directory permission issues
 
						- ACLs 
						- Attributes 
- 
						Account access
 
- 
						Unpatched vulnerable systems
 
- 
						Exposed or misconfigured services
 
- 
						Remote access issues
 
- 
						Certificate issues
 
- 
						Misconfigured package repository
 
- 
						Use of obsolete or insecure protocols and ciphers
 
- 
						Cipher negotiation issues
 
 
 | 
| 
				Given a scenario, analyze and troubleshoot performance issues. | 
				- Common symptoms
- 
						Swapping
 
- 
						Out of memory
 
- 
						Slow application response
 
- 
						System unresponsiveness
 
- 
						High CPU usage
 
- 
						High load average
 
- 
						High context switching
 
- 
						High failed log-in attempts
 
- 
						Slow startup
 
- 
						High input/output (I/O) wait time
 
- 
						Packet drops
 
- 
						Jitter
 
- 
						Random disconnects
 
- 
						Random timeouts
 
- 
						High latency
 
- 
						Slow response times
 
- 
						High disk latency
 
- 
						Low throughput
 
- 
						Blocked processes
 
- 
						Hardware errors
 
- 
						Sluggish terminal behavior
 
- 
						Exceeding baselines
 
- 
						Slow remote storage response
 
- 
						CPU bottleneck
 
 
 |