Linux Foundation Certified Systems Administrator

The Linux Foundation worked with industry experts and the Linux kernel community to identify the core domains and the critical skills, knowledge and abilities (“competencies”) applicable to each certification. Performance-based exams were then developed based on the competencies that were identified.

Below follows a subset of the full list of Domains and Competencies covered by the LFCS Exam. This subset represents topics most likely to appear given the delivery technology, performance-based questions and time constraints of the exam.  Download a pdf copy of the full list of Domains and Competencies here.

Essential Commands – 25%

  • Log into graphical and text mode consoles
  • Search for files
  • Evaluate and compare the basic file system features and options
  • Compare, create and edit text files
  • Compare binary files
  • Use input-output redirection (e.g. >, >>, |, 2>)
  • Analyze text using basic regular expressions
  • Archive, backup, compress, unpack, and uncompress files
  • Create, delete, copy, and move files and directories
  • Create hard and soft links
  • List, set, and change standard file permissions
  • Read, and use system documentation
  • Manage access to the root account

Operation of Running Systems – 20%

  • Boot, reboot, and shut down a system safely
  • Boot systems into different runlevels manually
  • Install, configure and troubleshoot the bootloader
  • Change the priority of a process
  • Identify resource utilization by process
  • Locate and analyze system log files
  • Schedule tasks to run at a set date and time
  • Verify completion of scheduled jobs
  • Update software to provide required functionality and security
  • Verify the integrity and availability of resources
  • Verify the integrity and availability of key processes
  • Change kernel runtime parameters, persistent and non-persistent
  • Use scripting to automate system maintenance tasks
  • Manage the startup process and services
  • List and identify SELinux/AppArmor file and process contexts
  • Configure and modify SELinux/AppArmor policies
  • Install software from source

User and Group Management – 15%

  • Create, delete, and modify local user accounts
  • Create, delete, and modify local groups and group memberships
  • Manage system-wide environment profiles
  • Manage template user environment
  • Configure user resource limits
  • Manage user processes
  • Configure PAM

Networking – 15%

  • Configure networking and hostname resolution statically or dynamically
  • Configure network services to start automatically at boot
  • Implement packet filtering
  • Configure firewall settings
  • Start, stop, and check the status of network services
  • Statically route IP traffic
  • Dynamically route IP traffic
  • Synchronize time using other network peers

Service Configuration – 10%

  • Configure a basic DNS server
  • Maintain a DNS zone
  • Configure an FTP server
  • Configure anonymous-only download on FTP servers
  • Provide/configure network shares via NFS
  • Provide/configure network shares via CIFS
  • Configure email aliases
  • Configure SSH servers and clients
  • Configure SSH-based remote access using public/private key pairs
  • Restrict access to the HTTP proxy server
  • Configure an IMAP and IMAPS service
  • Query and modify the behavior of system services at various run levels
  • Configure an HTTP server
  • Configure HTTP server log files
  • Restrict access to a web page
  • Diagnose routine SELinux/AppArmor policy violations
  • Configure database server

Virtualization – 5%

  • Configure a hypervisor to host virtual guests
  • Access a VM console
  • Configure systems to launch virtual machines at boot
  • Evaluate memory usage of virtual machines
  • Resize RAM or storage of VMs

Storage Management – 10%

  • List, create, delete, and modify storage partitions
  • Create, modify and delete Logical Volumes
  • Extend existing Logical Volumes and filesystems
  • Create and configure encrypted partitions
  • Configure systems to mount file systems at or during boot
  • Configure and manage swap space
  • Add new partitions, and logical volumes
  • Assemble partitions as RAID devices
  • Configure systems to mount standard, encrypted, and network file systems on demand
  • Create and manage filesystem Access Control Lists (ACLs)
  • Diagnose and correct file permission problems
  • Setup user and group disk quotas for filesystems

Be the first to comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.