CompTIA Server+ Study Guide - Troy McMillan - E-Book

CompTIA Server+ Study Guide E-Book

Troy McMillan

0,0
38,99 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.
Mehr erfahren.
Beschreibung

NOTE: The correct URL to access the Sybex interactive online test bank and study tools is www.wiley.com/go/sybextestprep. The book's back cover, Introduction, and last page in the book provided the wrong URL. We apologize for any confusion and inconvenience this may have caused you. Comprehensive interactive exam preparation plus expert insight from the field CompTIA Server+ Study Guide Exam SK0-004 is your ideal study companion for the SK0-004 exam. With 100% coverage of all exam objectives, this guide walks you through system hardware, software, storage, best practices, disaster recovery, and troubleshooting, with additional coverage of relevant topics including virtualization, big data, cloud storage, security, and scalability. Get an 'in the trenches' view of how server and data storage administration works in a real-world IT environment. From the basics through advanced topics, you'll learn how to deliver world-class solutions in today's evolving organizations by getting under the hood of technologies that enable performance, resiliency, availability, recoverability, and simplicity. Gain access to the Sybex interactive online learning environment, which features electronic flashcards, a searchable glossary, test bank, and bonus practice exams to reinforce what you have learned. Using and understanding in-house storage devices and the cloud has become an urgent skill for any IT professional. This is your comprehensive, expert driven study guide for taking the CompTIA Server+ exam SK0-004 * Study 100% of exam objectives and more * Understand storage design, implementation, and administration * Utilize bonus practice exams and study tools * Gain a real-world perspective of data storage technology CompTIA Server+ Study Guide Exam SK0-004 is your ticket to exam day confidence.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 706

Veröffentlichungsjahr: 2016

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



CompTIA Server+®Study Guide

Troy McMillan

Senior Acquisitions Editor: Kenyon Brown Development Editor: David Clark Technical Editors: Robin Abernathy and Quentin Docter Production Editor: Christine O'Connor Copy Editor: Elizabeth Welch Editorial Manager: Mary Beth Wakefield Production Manager: Kathleen Wisor Executive Editor: Jim Minatel Book Designers: Judy Fung and Bill Gibson Proofreader: Rebecca Rider Indexer: John Sleeva Project Coordinator, Cover: Brent Savage Cover Designer: Wiley Cover Image: Getty Images Inc./Jeremy Woodhouse

Copyright © 2016 by John Wiley & Sons, Inc., Indianapolis, Indiana

Published simultaneously in Canada

ISBN: 978-1-119-13782-5 ISBN: 978-1-119-13784-9 (ebk.) ISBN: 978-1-119-13783-2 (ebk.)

Manufactured in the United States of America

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.

Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Web site may provide or recommendations it may make. Further, readers should be aware that Internet Web sites listed in this work may have changed or disappeared between when this work was written and when it is read.

For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S. at (877) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002.

Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at http://booksupport.wiley.com. For more information about Wiley products, visit www.wiley.com.

Library of Congress Control Number: 2016940086

TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. CompTIA and Server+ are registered trademarks of CompTIA Properties, LLC. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.

For my wife Heike, who makes the hard work all worth it

Acknowledgments

Special thanks go to David Clark for keeping me on schedule and ensuring all the details are correct. Also I’d like to thank Robin Abernathy and Quentin Docter for the excellent technical edit that saved me from myself at times. Finally, as always I’d like to acknowledge Kenyon Brown for his continued support of all my writing efforts.

About the Author

Troy McMillan writes practice tests, study guides, and online course materials for Kaplan IT Cert Prep, while also running his own consulting and training business. He holds over 30 industry certifications. Troy can be reached at [email protected].

CONTENTS

Introduction

What Does This Book Cover?

The CompTIA Server+ Exam Objectives

CompTIA SK0-004 Exam

Assessment Test

Answers to Assessment Test

Chapter 1 Server Hardware

Server Form Factors

Installing and Configuring Server Components

Maintaining Power and Cooling Requirements

Summary

Exam Essentials

Review Questions

Chapter 2 Installing and Configuring Servers

Installing and Configuring Server Operating Systems

Using Access and Control Methods to Administer a Server

Purpose and Operation of Virtualization Components

Summary

Exam Essentials

Review Questions

Chapter 3 Server Maintenance

Server Roles and Requirements

Proper Server Maintenance Techniques

Asset Management and Documentation

Summary

Exam Essentials

Review Questions

Chapter 4 Storage Technologies

Hardware and Features of Various Storage Technologies

Installing and Deploying Primary Storage Devices

Summary

Exam Essentials

Review Questions

Chapter 5 Identifying Capacity and Fault Tolerance Requirements

Calculating Appropriate Storage Capacity and Planning for Future Growth

Configuring RAID

Summary

Exam Essentials

Review Questions

Chapter 6 Securing the Server

Physical Security Methods and Concepts

Server Hardening Techniques

Proper Environmental Controls and Techniques

Summary

Exam Essentials

Review Questions

Chapter 7 Securing Server Data and Network Access

Basic Network Security Systems and Protocols

Logical Access Control Methods

Data Security Methods and Secure Storage Disposal Techniques

Summary

Exam Essentials

Review Questions

Chapter 8 Networking

Configuring Servers to Use IP Addressing and Network Infrastructure Services

Ports and Protocols

Cable Management Procedures

Summary

Exam Essentials

Review Questions

Chapter 9 Disaster Recovery

Disaster Recovery Principles

Backup

Summary

Exam Essentials

Review Questions

Chapter 10 Troubleshooting Hardware and Software Issues

Troubleshooting Theory and Methodologies

Troubleshooting Hardware Problems

Troubleshooting Software Problems

Summary

Exam Essentials

Review Questions

Chapter 11 Troubleshooting Connectivity Issues

Diagnosing Network Problems

Diagnosing Security Issues

Summary

Exam Essentials

Review Questions

Chapter 12 Troubleshooting Storage Issues

Troubleshooting Storage Problems

Summary

Exam Essentials

Review Questions

Appendix Answers to Review Questions

Chapter 1: Server Hardware

Chapter 2: Installing and Configuring Servers

Chapter 3: Server Maintenance

Chapter 4: Storage Technologies

Chapter 5: Identifying Capacity and Fault Tolerance Requirements

Chapter 6: Securing the Server

Chapter 7: Securing Server Data and Network Access

Chapter 8: Networking

Chapter 9: Disaster Recovery

Chapter 10: Troubleshooting Hardware and Software Issues

Chapter 11: Troubleshooting Connectivity Issues

Chapter 12: Troubleshooting Storage Issues

Advert

EULA

List of Tables

Chapter 1

Table 1.1

Table 1.2

Table 1.3

Chapter 4

Table 4.1

Table 4.2

Table 4.3

Table 4.4

Chapter 5

Table 5.1

Table 5.2

Chapter 7

Table 7.1

Table 7.2

Table 7.3

Chapter 8

Table 8.1

Table 8.2

Table 8.3

Table 8.4

Chapter 11

Table 11.1

Chapter 12

Table 12.1

List of Illustrations

Chapter 1

Figure 1.1

Server in a rack

Figure 1.2

A 4U server

Figure 1.3

Cable management arm

Figure 1.4

Rail kit installation

Figure 1.5

Tower server

Figure 1.6

Tower server in a rack

Figure 1.7

Rack vs. blade

Figure 1.8

Blade enclosure

Figure 1.9

Midplane

Figure 1.10

Midplane power

Figure 1.11

Advanced management module

Figure 1.12

Inserting a blade server and filler

Figure 1.13

PGA and LGA

Figure 1.14

Dual-channel memory slots

Figure 1.15

PCI slots

Figure 1.16

Comparison of PCI slot types

Figure 1.17

Traditional and CNA

Figure 1.18

Magnetic hard drive

Figure 1.19

CHS

Figure 1.20

Hybrid approaches

Figure 1.21

Riser card in rack server

Figure 1.22

RAID controller

Figure 1.23

CMOS battery in a server

Figure 1.24

Voltage switch

Figure 1.25

Edison plug

Figure 1.26

Locking plug

Figure 1.27

Hot aisle/cold aisle configuration

Figure 1.28

Baffles

Figure 1.29

Rack fans

Figure 1.30

Liquid cooling

Chapter 2

Figure 2.1

View/Add Configuration

Figure 2.2

Confirming the drive additions

Figure 2.3

Array configuration screen

Figure 2.4

Selecting the RAID level

Figure 2.5

Creating a partition

Figure 2.6

Running an application as administrator

Figure 2.7

Using

runas

Figure 2.8

Joining the server to the domain

Figure 2.9

Adding a role in Server Manager

Figure 2.10

Seven-day Memory Pages Per Second report

Figure 2.11

PXE boot process

Figure 2.12

Standard KVM switch

Figure 2.13

Serial device server

Figure 2.14

VMware Server Console

Figure 2.15

VMM in Windows Hyper-V

Figure 2.16

KVM over IP

Figure 2.17

iLO port

Figure 2.18

iDRAC port

Figure 2.19

iDRAC console

Figure 2.20

RDCMan

Figure 2.21

Hosts and guest

Figure 2.22

Oracle VM VirtualBox

Figure 2.23

Type I and II hypervisors

Figure 2.24

Container-based virtualization

Figure 2.25

Enabling hardware-assisted virtualization

Figure 2.26

Setting CPU allocations in Hyper-V

Figure 2.27

Shared storage

Figure 2.28

Creating a virtual disk in Hyper-V

Figure 2.29

Citrix dynamic memory allocation

Figure 2.30

NAT vs. bridged

Figure 2.31

vSwitch

Figure 2.32

Assigning a vSwitch to physical adapters

Figure 2.33

Increasing video memory

Chapter 3

Figure 3.1

Three tiers

Figure 3.2

Deduplication techniques

Figure 3.3

Log forwarding

Figure 3.4

LEDs

Figure 3.5

Dell LCD

Figure 3.6

IBM Light path diagnostics

Figure 3.7

Active/active cluster

Figure 3.8

Active/passive cluster

Figure 3.9

Round robin load balancing

Figure 3.10

Heartbeat connection

Figure 3.11

Enterprise architecture diagram

Figure 3.12

Data flow for order entry

Chapter 4

Figure 4.1

Storage technologies

Figure 4.2

Fiber HBA

Figure 4.3

LUN masking

Figure 4.4

Classic SAN and SAN with iSCSI

Figure 4.5

FCoE and iSCSI

Figure 4.6

JBOD

Figure 4.7

Tape library

Figure 4.8

SAS cabling

Figure 4.9

SAS system receptacle with the SATA HDD plug

Figure 4.10

SCSI interfaces

Figure 4.11

USB to SCSI

Figure 4.12

Fiber switch

Chapter 5

Figure 5.1

Disk quotas

Figure 5.2

Disk compression

Figure 5.3

Event Log properties

Figure 5.4

Hierarchical storage systems

Figure 5.5

RAID 0

Figure 5.6

RAID 1

Figure 5.7

RAID 5

Figure 5.8

RAID 6

Figure 5.9

RAID 10

Figure 5.10

Hardware and software RAID

Figure 5.11

Battery-backed cache

Figure 5.12

Redundant RIAD controller

Chapter 6

Figure 6.1

Mantrap

Figure 6.2

Cabinet lock with alarm

Figure 6.3

Rack mount lock

Figure 6.4

Tower server lock

Figure 6.5

Tower cabinet

Figure 6.6

MBSA results

Figure 6.7

Nessus output

Figure 6.8

Disabling USB ports in Device Manager

Figure 6.9

Disabling USB ports in the BIOS

Figure 6.10

Expanding the Network adaptors category

Figure 6.11

Disable adaptor

Figure 6.12

Setting a BIOS password

Figure 6.13

Disabling WOL

Figure 6.14

Accessing boot settings

Figure 6.15

Changing the boot order

Figure 6.16

Open case warning in the BIOS

Figure 6.17

Automatic shutdown

Figure 6.18

Checking battery level

Figure 6.19

Maintenance bypass

Figure 6.20

Installing the remote management card

Figure 6.21

Rack PDU

Figure 6.22

Redundant PDUs

Figure 6.23

Multiple circuits

Figure 6.24

Redundant UPS with single PDU

Figure 6.25

Proper ESD strap connection

Figure 6.26

Proper use of an ESD mat

Figure 6.27

Wet and dry systems

Figure 6.28

Rack stabilizer

Figure 6.29

Pinch point warning

Figure 6.30

Rack monitor

Figure 6.31

Rack fillers or filler panels

Figure 6.32

Baffles

Figure 6.33

Blanking panels

Figure 6.34

Hot aisle and cold aisle

Chapter 7

Figure 7.1

A proxy firewall blocking network access from external networks

Figure 7.2

A dual-homed firewall segregating two networks from each other

Figure 7.3

802.1x process

Figure 7.4

Microsoft Network Access Protection

Figure 7.5

USB policies

Chapter 8

Figure 8.1

DHCP relay agent

Figure 8.2

TCP/IP properties

Figure 8.3

DNS tab

Figure 8.4

Adding a domain suffix to the search list

Figure 8.5

Group Policy

Figure 8.6

DNS client settings

Figure 8.7

Primary DNS suffix

Figure 8.8

WINS tab

Figure 8.9

Adding the WINS server

Figure 8.10

MAC address output

Figure 8.11

OUI and UAA

Figure 8.12

Server Manager

Figure 8.13

NIC Teaming

Figure 8.14

New Team

Figure 8.15

NIC team settings

Figure 8.16

New NIC team

Figure 8.17

Setting Speed & Duplex

Figure 8.18

Twisted pair cable

Figure 8.19

Pin assignments for T568A and T568B

Figure 8.20

Rollover pin-out

Figure 8.21

Fiber connectors ST, SC, and LC

Figure 8.22

Fiber SFP

Figure 8.23

HP 2-port server adapter

Figure 8.24

RJ-45 and an RJ-11 connector

Figure 8.25

Cable channel

Figure 8.26

Attaching cable to vertical trays

Figure 8.27

Horizontal cable tray

Figure 8.28

Cable ties

Chapter 9

Figure 9.1

Disk to disk

Figure 9.2

Server to server

Figure 9.3

Site to site

Figure 9.4

Grandfather/father/son

Chapter 10

Figure 10.1

Selecting Run Diags

Figure 10.2

Test one device

Figure 10.3

Dust builds up inside the system.

Figure 10.4

Service dependencies

Figure 10.5

Run as Administrator

Figure 10.6

System

Figure 10.7

System Properties Advanced tab

Figure 10.8

Performance Options

Figure 10.9

Virtual memory settings

Figure 10.10

Tools menu

Figure 10.11

The opening interface of Event Viewer

Figure 10.12

Event log Properties

Figure 10.13

Resource Monitor

Figure 10.14

Memory tab

Figure 10.15

Adding a counter

Figure 10.16

Drive Optimization tool

Figure 10.17

Disk Management

Figure 10.18

Initialize disk pop-up

Figure 10.19

Initialize disk

Figure 10.20

Shrink Volume

Figure 10.21

Set volume size

Figure 10.22

Change Drive Letter

Chapter 11

Figure 11.1

Pinging the conflicted address

Figure 11.2

Using

arp -a

to identify the MAC address

Figure 11.3

Network and Sharing Center

Figure 11.4

Set Up A New Connection Or Network

Figure 11.5

Manually connecting to a wireless network

Figure 11.6

Wireshark

Figure 11.7

Frame details

Figure 11.8

ICMP codes

Figure 11.9

The ping command

Figure 11.10

Using tracert

Figure 11.11

Using ipconfig

Figure 11.12

ifconfig

Figure 11.13

Typing

net use

lets you see what is currently shared.

Figure 11.14

Using nbtstat

Figure 11.15

Using netstat

Figure 11.16

Service dependencies

Figure 11.17

gpresult

Figure 11.18

Task Manager

Figure 11.19

Zenmap

Figure 11.20

Nmap command line

Figure 11.21

Wireshark

Figure 11.22

Programs And Features

Figure 11.23

Turn Windows Features On Or Off

Chapter 12

Figure 12.1

top

output

Figure 12.2

Enabling write-back cache in Windows

Figure 12.3

Using

fdisk

Figure 12.4

Actions menu

Figure 12.5

Status in Disk Management

Figure 12.6

Initialize Disk pop-up

Figure 12.7

Initializing a disk

Figure 12.8

Shrink Volume

Figure 12.9

Setting the volume size

Figure 12.10

Change Drive Letter And Paths

Figure 12.11

The Select Drives To Create A Storage Pool page

Figure 12.12

Creating a storage space

Figure 12.13

HP Array Configuration Utility

Figure 12.14

Solarwinds Storage Manager

Guide

Cover

Table of Contents

Chapter

Pages

xx

xxi

xxii

xxiii

xxiv

xxv

xxvi

xxvii

xxviii

xxix

xxx

xxxi

xxxii

xxxiii

xxxiv

xxxv

xxxvi

xxxvii

xxxviii

xxxix

xl

xli

xlii

xliii

xliv

xlv

xlvi

xlvii

xlviii

xlix

l

li

lii

liii

liv

lv

lvi

lvii

lviii

lix

lx

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

85

86

87

88

89

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

173

174

175

176

177

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

202

203

204

205

206

207

208

209

210

211

212

213

214

215

216

217

218

219

221

222

223

224

225

226

227

228

229

230

231

232

233

234

235

236

237

238

239

240

242

243

244

245

246

247

248

249

250

251

253

254

255

256

257

258

259

260

262

264

265

267

268

269

270

272

273

274

275

276

277

278

279

280

281

282

283

284

285

286

287

288

289

290

291

292

293

294

295

296

297

298

299

300

301

302

303

304

305

306

307

308

309

310

311

312

313

315

316

317

318

319

320

321

322

323

324

325

326

327

328

329

330

331

332

333

334

335

336

337

338

339

340

341

342

343

344

345

346

347

348

349

350

351

352

354

355

356

357

358

359

360

361

362

363

365

366

367

368

369

370

371

373

374

375

376

377

378

379

380

381

382

383

384

385

386

387

388

390

391

392

393

394

395

396

397

398

399

400

401

402

404

405

406

407

408

409

411

412

413

414

415

416

417

418

419

420

421

422

423

424

425

426

427

428

429

430

431

433

434

435

436

437

438

439

440

441

442

443

444

445

446

447

448

449

450

451

452

453

454

455

456

457

458

459

460

461

462

463

Introduction

The Server+ certification program was developed by the Computing Technology Industry Association (CompTIA) to provide an industry-wide means of certifying the competency of computer server technicians. The Server+ certification, which is granted to those who have attained the level of knowledge and troubleshooting skills that are needed to provide capable support to the most commonly used server and storage systems, is similar to other certifications in the computer industry. The theory behind these certifications is that if you needed to have service performed on any of their products, you would sooner call a technician who has been certified in one of the appropriate programs than you would just call the first so-called “expert” in the phone book.

CompTIA’s Server+ exam objectives are periodically updated to keep the certification applicable to the most recent hardware and software. This is necessary because a technician must be able to work on the latest equipment. The most recent revisions to the objectives—and to the whole program—were introduced in 2015 and are reflected in this book.

This book and Sybex’s CompTIA Server+ Complete Study Guide (both the Standard and Deluxe Editions) are tools to help you prepare for this certification—and for the new areas of focus of a modern server technician’s job.

What Is Server+ Certification?

The Server+ certification program was created to offer a wide-ranging certification, in the sense that it’s intended to certify competence with servers from many different makers/ vendors. Everyone must take and pass one exam: SK0-004.

The Server+ certification isn’t awarded until you’ve passed the test. For the latest pricing on the exams and updates to the registration procedures, call Pearson VUE at (877) 551-7587. You can also go to the website, www.vue.com, for additional information or to register online. If you have further questions about the scope of the exams or related CompTIA programs, refer to the CompTIA website at www.comptia.org.

Who Should Buy This Book?

If you want to acquire a solid foundation in servers and the storage systems they use, and your goal is to prepare for the exams by filling in any gaps in your knowledge, this book is for you. You’ll find clear explanations of the concepts you need to grasp and plenty of help to achieve the high level of professional competency you need in order to succeed in your chosen field.

If you want to become certified as a Server+ holder, this book is definitely what you need. However, if you just want to attempt to pass the exam without really understanding the basics of personal computers, this guide isn’t for you. It’s written for people who want to acquire skills and knowledge of servers and storage systems.

What Does This Book Cover?

This book covers everything you need to know to pass the CompTIA Server+ exam.

What’s Included in the Book

We’ve included several learning tools throughout the book:

Objective map and opening list of objectives We have included a detailed exam objective map showing you where each of the exam objectives is covered. In addition, each chapter opens with a list of the exam objectives it covers. Use these resources to see exactly where each of the exam topics is covered.

Assessment test We have provided an assessment test that you can use to check your readiness for the exam at the end of this Introduction. Take this test before you start reading the book; it will help you determine the areas on which you might need to brush up. The answers to the assessment test questions appear on a separate page after the last question of the test. Each answer includes an explanation and a note telling you the chapter in which the material appears.

Exam essentials Each chapter, just before the summary, includes a number of exam essentials. These are the key topics that you should take from the chapter in terms of areas on which you should focus when preparing for the exam.

Chapter Review Questions To test your knowledge as you progress through the book, there are review questions at the end of each chapter. As you finish each chapter, answer the review questions and then check your answers—the correct answers appear in the Appendix. You can go back to reread the section that deals with each question you got wrong to ensure that you answer correctly the next time you’re tested on the material.

Interactive Online Learning Environment and Test Bank

The interactive online learning environment that accompanies CompTIA Server+ Exam SK0-004 provides a test bank with study tools to help you prepare for the certification exams and increase your chances of passing them the first time! The test bank includes the following elements:

Sample tests All of the questions in this book are provided, including the assessment test, which you’ll find at the end of this introduction, and the chapter tests that include the review questions at the end of each chapter. In addition, there are two practice exams. Use these questions to test your knowledge of the study guide material. The online test bank runs on multiple devices.

Flashcards One set of questions is provided in digital flashcard format (a question followed by a single correct answer). You can use the flashcards to reinforce your learning and provide last-minute test prep before the exam.

Glossary The key terms from this book and their definitions are available as a fully searchable PDF.

   Go to www.wiley.com/go/sybextestprep to register and gain access to this interactive online learning environment and test bank with study tools.

How to Use This Book

If you want a solid foundation for preparing for the Server+ exam, this is the book for you. I’ve spent countless hours putting together this book with the sole intention of helping you prepare for the exams.

This book is loaded with valuable information, and you will get the most out of your study time if you understand how we put the book together. Here’s a list that describes how to approach studying:

Take the assessment test immediately following this introduction. It’s okay if you don’t know any of the answers—that’s what this book is for. Carefully read over the explanations for any question you get wrong, and make note of the chapters where that material is covered.

Study each chapter carefully, making sure you fully understand the information and the exam objectives listed at the beginning of each one. Again, pay extra-close attention to any chapter that includes material covered in questions you missed on the assessment test.

Read over the summary and exam essentials. These will highlight the sections from the chapter with which you need to be familiar before sitting for the exam.

Answer all of the review questions at the end of each chapter. Specifically note any questions that confuse you, and study the corresponding sections of the book again. Don’t just skim these questions! Make sure that you understand each answer completely.

Go over the electronic flashcards. These help you prepare for the latest Server+ exam, and they’re really great study tools.

Take the practice exam.

Performance-Based Questions

CompTIA includes performance-based questions on the Server+ exams. These are not the traditional multiple-choice questions with which you’re probably familiar. These questions require the candidate to know how to perform a specific task or series of tasks. The candidate will be presented with a scenario and will be asked to complete a task. They will be taken to a simulated environment where they will have to perform a series of steps and will be graded on how well they complete the task.

Tips for Taking the Server+ Exam

Here are some general tips for taking your exams successfully:

Bring two forms of ID with you. One must be a photo ID, such as a driver’s license. The other can be a major credit card or a passport. Both forms must include a signature.

Arrive early at the exam center so you can relax and review your study materials, particularly tables and lists of exam-related information.

Read the questions carefully. Don’t be tempted to jump to an early conclusion. Make sure you know exactly what the question is asking.

Don’t leave any unanswered questions. Unanswered questions are scored against you.

There will be questions with multiple correct responses. When there is more than one correct answer, a message at the bottom of the screen will prompt you to either “Choose two” or “Choose all that apply.” Be sure to read the messages displayed to know how many correct answers you must choose.

When answering multiple-choice questions you’re not sure about, use a process of elimination to get rid of the obviously incorrect answers first. Doing so will improve your odds if you need to make an educated guess.

On form-based tests (nonadaptive), because the hard questions will eat up the most time, save them for last. You can move forward and backward through the exam.

For the latest pricing on the exams and updates to the registration procedures, visit CompTIA’s website at

www.comptia.org

.

The CompTIA Server+ Exam Objectives

CompTIA goes to great lengths to ensure that its certification programs accurately reflect the IT industry’s best practices. The company does this by establishing Cornerstone Committees for each of its exam programs. Each committee consists of a small group of IT professionals, training providers, and publishers who are responsible for establishing the exam’s baseline competency level and who determine the appropriate target audience level.

Once these factors are determined, CompTIA shares this information with a group of hand-selected Subject Matter Experts (SMEs). These folks are the true brainpower behind the certification program. They review the committee’s findings, refine them, and shape them into the objectives you see before you. CompTIA calls this process a Job Task Analysis (JTA).

Finally, CompTIA conducts a survey to ensure that the objectives and weightings truly reflect the job requirements. Only then can the SMEs go to work writing the hundreds of questions needed for the exam. And, in many cases, they have to go back to the drawing board for further refinements before the exam is ready to go live in its final state. So, rest assured, the content you’re about to learn will serve you long after you take the exam.

   Exam objectives are subject to change at any time without prior notice and at CompTIA’s sole discretion. Please visit the certification page of CompTIA’s website at www.comptia.org for the most current listing of exam objectives.

CompTIA also publishes relative weightings for each of the exam’s objectives. The following tables list the objective domains and the extent to which they’re represented on each exam.

SK0-004 Exam Domains

% of Exam

1.0 Server Architecture

12%

2.0 Server Administration

24%

3.0 Storage

12%

4.0 Security

13%

5.0 Networking

10%

6.0 Disaster Recovery

9%

7.0 Troubleshooting

20%

Total

100%

The following sections look at the objectives beneath each of these domains in more detail.

CompTIA SK0-004 Exam

1.1 Explain the purpose and function of server form factors

Rack mount

Dimensions

1U, 2U, 4U

Cable management arms

Rail kits

Tower

Blade technology

Blade enclosure

Backplane/Midplane

Power supply sockets

Network modules/switches

Management modules

Blade server

1.2 Given a scenario, install, configure and maintain server components

CPU

Multiprocessor vs. multicore

Socket type

Cache levels: L1, L2, L3

Speeds

Core

Bus

Multiplier

CPU stepping

Architecture

x86

x64

ARM

RAM

ECC vs. non-ECC

DDR2, DDR3

Number of pins

Static vs. dynamic

Module placement

CAS latency

Timing

Memory pairing

Bus types, bus channels, and expansion slots

Height differences and bit rate differences

PCI

PCIe

PCI-X

NICs

Hard drives

Riser cards

RAID controllers

BIOS/UEFI

CMOS battery

Firmware

USB interface/port

Hotswap vs. non-hotswap components

1.3 Compare and contrast power and cooling components

Power

Voltage

110v vs. 220v vs. –48v

208v vs. 440v/460v/480v

Wattage

Consumption

Redundancy

1-phase vs. 3-phase power

Plug types

NEMA

Edison

Twist lock

Cooling

Airflow

Thermal dissipation

Baffles/shrouds

Fans

Liquid cooling

2.1 Install and configure server operating systems

Determine server role/purpose

Update firmware

BIOS/UEFI configuration

Boot order

Disk preparation

RAID setup

Partitioning

Formatting

File system type

Ext 2, 3, 4

NTFS

FAT32

ReiserFS

UFS

VMFS

ZFS

Swap

Configure host name

Local account setup

Connect to network

Join domain/directory

Address security concerns

Patching

OS hardening

Compliance to company procedures/standards

Enable services

Install features/roles/applications/drivers

Performance baseline

Server optimization

Swap or pagefile optimization

Unattended/remote installations

Deploying images and cloning

Scripted installs

PXE boot

TFTP

2.2 Compare and contrast server roles and requirements for each

Web server

Application server

Directory server

Database server

File server

Print server

Messaging server

Mail server

Routing and remote access server

Network services server

DHCP

DNS/WINS

NTP

2.3 Given a scenario, use access and control methods to administer a server

Local hardware administration

KVM

Serial

Virtual Administration console

Network-based hardware administration

KVM over IP

ILO

iDRAC

Network-based operating system administration

RDP

SSH

VNC

Command line/shell

2.4 Given a scenario, perform proper server maintenance techniques

Change management

Patch management

Operating System updates

Application updates

Security software updates

Firmware updates

Device drivers updates

Compatibility lists

Operating systems

Hardware

Applications

Testing and validation

Outages and service level agreements

Scheduled downtime

Unscheduled downtime

Impact analysis

Client notification

MTTR

Performance monitoring

CPU utilization

Memory utilization

Network utilization

Disk utilization

Disk IOPS

Storage capacity

Comparison against performance baseline

Processes and services monitoring

Log monitoring

Hardware maintenance

Check system health indicators

LEDs

Error codes

Beep codes

LCD messages

Replace failed components

Fans

Hard drives

RAM

Backplanes

Batteries

Preventative maintenance

Clearing dust

Check proper air flow

Proper shut down procedures

Fault tolerance and high availability techniques

Clustering

Active/active

Active/passive

Load balancing

Round robin

Heartbeat

2.5 Explain the importance of asset management and documentation

Asset management

Licensing

Labeling

Warranty

Life cycle management

Procurement

Usage

End of life

Disposal/recycling

Inventory

Make

Model

Serial number

Asset tag

Documentation

Service manuals

Network diagrams

Architecture diagrams

Dataflow diagrams

Recovery documentation

Baseline documentation

Change management policies

Service Level Agreement

Server configuration

Secure storage of sensitive documentation

2.6 Explain the purpose and operation of virtualization components

Hosts and guests

Management interface for virtual machines

Hypervisor

Type I

Type II

Hybrid

Hardware compatibility list

BIOS/UEFI compatibility and support

CPU compatibility support

AMD-V/Intel VT

Resource allocation between Guest and Host

CPU

Storage

Memory

Network connectivity

Direct Access (Bridging) vs. NAT

Virtual NICs

Virtual switches

Video

3.1 Given a scenario, install and deploy primary storage devices based on given specifications and interfaces

Disk specifications

RPM

Dimensions/form factor

Capacity

Bus width

IOPS

Seek time and latency

Hotswap vs. non-hotswap components

Interfaces

SAS

SATA

SCSI

USB

Fibre Channel

Hard drive vs. SSD

3.2 Given a scenario, configure RAID using best practices

RAID levels and performance considerations

0

1

5

6

10

Software vs. hardware RAID

Performance considerations

Configuration specifications

Capacity

Bus types

Drive RPM

Hotswap support and ramifications

Hot spare vs. cold spare

Array controller

Memory

Battery backed cache

Redundant controller

3.3 Summarize hardware and features of various storage technologies

DAS

NAS

iSCSI

FCoE

SAN

Fibre Channel

LUN and LUN masking

HBAs and fabric switches

JBOD

Tape

Drive

Libraries

Optical drive

Flash, Compact Flash, and USB drive

3.4 Given a scenario, calculate appropriate storage capacity and plan for future growth

Base10 vs. Base2 disk size calculation (1000 vs. 1024)

Disk quotas

Compression

Capacity planning considerations:

Operating system growth

Patches

Service packs

Log files

Temporary directories

Databases

Application servers

File servers

Archival

4.1 Compare and contrast physical security methods and concepts

Multifactor Authentication

Something you have

Something you know

Something you are

Security concepts

Mantrap

RFID chip

ID card

Biometric

Keypad

Access list

Security guard

Security camera

Keys & Locks

Cabinet

Rack mount

Server

Safe

4.2 Given a scenario, apply server hardening techniques

OS hardening

Stopping unneeded services/closing unneeded ports

Install only required software

Install latest operating system patches

Application hardening

Install latest patches

Disabling unneeded services/roles/features

Endpoint security

HIDS

Anti-malware

Remediate security issues based on a vulnerability scan

Hardware hardening

Disabling unneeded hardware and physical ports/devices

BIOS password

Disable WOL (Wake on LAN)

Set up boot order

Chassis locks/intrusion detection

4.3 Explain basic network security systems and protocols

Firewall

Network-based

Host-based

Port security/802.1x/NAC

Router access list

NIDS

Authentication protocols

LDAP

RADIUS

TACACS

TACACS+

PKI

Private key

Public key

Certificate authority

SSL/TLS

VPN

IPSEC

VLAN

Security zones

DMZ

Public and private

Intranet and extranet

4.4 Implement logical access control methods based on company policy

Access control lists

Users

Groups

Roles

Resources

File system

Network ACLs

Peripheral devices

Administrative rights

Distribution lists

Permissions

Read

Write/Modify

Execute

Delete

Full control/Superuser

File vs. share

4.5 Implement data security methods and secure storage disposal techniques

Storage encryption

File-level encryption

Disk encryption

Tape encryption

Storage media

Soft wipe

File deletion

Hard wipe

Zero out all sectors

Physical destruction

Remote wipe

4.6 Given a scenario, implement proper environmental controls and techniques

Power concepts and best practices

UPS

Runtime vs. capacity

Automated graceful shutdown of attached devices

Periodic testing of batteries

Maximum load

Bypass procedures

Remote management

PDU

Connect redundant rack PDUs to separate circuits

Capacity planning

PDU ratings

UPS ratings

Total potential power draw

Multiple circuits

Connect redundant power supplies to separate PDUs

Safety

ESD procedures

Fire suppression

Proper lifting techniques

Rack stability

Floor load limitations

Sharp edges and pinch points

HVAC

Room and rack temperature and humidity

Monitoring and alert notifications

Air flow

Rack filler/baffle/blanking panels

Hot aisle and cold aisle

5.1 Given a scenario, configure servers to use IP addressing and network infrastructure services

IPv4 vs. IPv6

Default gateway

CIDR notation and subnetting

Public and private IP addressing

Static IP assignment vs. DHCP

DNS

FQDN

Default domain suffix/search domain

WINS

NetBIOS

NAT/PAT

MAC addresses

Network Interface Card configuration

NIC teaming

Duplexing

Full

Half

Auto

Speeds

10/100/1000 Mbps

10 Gbps

5.2 Compare and contrast various ports and protocols

TCP vs. UDP

SNMP 161

SMTP 25

FTP 20/21

SFTP 22

SSH 22

SCP 22

NTP 123

HTTP 80

HTTPS 443

TELNET 23

IMAP 143

POP3 110

RDP 3389

FTPS 989/990

LDAP 389/3268

DNS 53

DHCP 68

5.3 Given a scenario, install cables and implement proper cable management procedures

Copper

Patch cables

Crossover

Straight through

Rollover

CAT5

CAT5e

CAT6

Fiber

Singlemode

Multimode

Connectors

ST

LC

SC

SFP

RJ-45

RJ-11

Cable placement and routing

Cable channels

Cable management trays

Vertical

Horizontal

Labeling

Bend radius

Cable ties

6.1 Explain the importance of disaster recovery principles

Site types

Hot site

Cold site

Warm site

Replication methods

Disk to disk

Server to server

Site to site

Continuity of Operations

Disaster recovery plan

Business continuity plan

Business impact analysis

Who is affected

What is affected

Severity of impact

6.2 Given a scenario, implement appropriate backup techniques

Methodology

Full/Normal

Copy

Incremental

Differential

Snapshot

Selective

Bare metal

Open file

Data vs. OS restore

Backup media

Linear Access

Tape

Random Access

Disk

Removable media

Optical media

Media and restore best practices

Labeling

Integrity verification

Test restorability

Tape rotation and retention

Media storage location

Offsite

Onsite

Security considerations

Environmental considerations

7.1 Explain troubleshooting theory and methodologies

Identify the problem and determine the scope

Question users/stakeholders and identify changes to the server/environment

Collect additional documentation/logs

If possible, replicate the problem as appropriate

If possible, perform backups before making changes

Establish a theory of probable cause (question the obvious)

Determine whether there is a common element of symptom causing multiple problems

Test the theory to determine cause

Once theory is confirmed, determine next steps to resolve problem

If theory is not confirmed, establish new theory or escalate

Establish a plan of action to resolve the problem and notify impacted users

Implement the solution or escalate as appropriate

Make one change at a time and test/confirm the change has resolved the problem

If the problem is not resolved, reverse the change if appropriate and implement a new change

Verify full system functionality and if applicable implement preventative measures

Perform a root cause analysis

Document findings, actions and outcomes throughout the process

7.2 Given a scenario, effectively troubleshoot hardware problems, selecting the appropriate tools and methods

Common problems

Failed POST

Overheating

Memory failure

Onboard component failure

Processor failure

Incorrect boot sequence

Expansion card failure

Operating system not found

Drive failure

Power supply failure

I/O failure

Causes of common problems

Third-party components or incompatible components

Incompatible or incorrect BIOS

Cooling failure

Mismatched components

Backplane failure

Environmental issues

Dust

Humidity

Temperature

Power surge/failure

Hardware tools

Power supply tester (multimeter)

Hardware diagnostics

Compressed air

ESD equipment

7.3 Given a scenario, effectively troubleshoot software problems, selecting the appropriate tools and methods

Common problems

User unable to logon

User cannot access resources

Memory leak

BSOD/stop

OS boot failure

Driver issues

Runaway process

Cannot mount drive

Cannot write to system log

Slow OS performance

Patch update failure

Service failure

Hangs on shut down

Users cannot print

Cause of common problems

User Account Control (UAC/SUDO)

Corrupted files

Lack of hard drive space

Lack of system resources

Virtual memory (misconfigured, corrupt)

Fragmentation

Print server drivers/services

Print spooler

Software tools

System logs

Monitoring tools (resource monitor, performance monitor)

Defragmentation tools

Disk property tools (usage, free space, volume, or drive mapping)

7.4 Given a scenario, effectively diagnose network problems, selecting the appropriate tools and methods

Common problems

Internet connectivity failure

Email failure

Resource unavailable

DHCP server mis-configured

Non-functional or unreachable

Destination host unreachable

Unknown host

Default gateway mis-configured

Failure of service provider

Cannot reach by host name/FQDN

Causes of common problems

Improper IP configuration

VLAN configuration

Port security

Improper subnetting

Component failure

Incorrect OS route tables

Bad cables

Firewall (mis-configuration, hardware failure, software failure)

Mis-configured NIC, routing/switch issues

DNS and/or DHCP failure

Mis-configured hosts file

IPv4 vs. IPv6 misconfigurations

Networking tools

ping

tracert/traceroute

ipconfig/ifconfig

nslookup

net use/mount

route

nbtstat

netstat

7.5 Given a scenario, effectively troubleshoot storage problems, selecting the appropriate tools and methods

Common problems

Slow file access

OS not found

Data not available

Unsuccessful backup

Error lights

Unable to mount the device

Drive not available

Cannot access logical drive

Data corruption

Slow I/O performance

Restore failure

Cache failure

Multiple drive failure

Causes of common problems

Media failure

Drive failure

Controller failure

HBA failure

Loose connectors

Cable problems

Mis-configuration

Improper termination

Corrupt boot sector

Corrupt file system table

Array rebuild

Improper disk partition

Bad sectors

Cache battery failure

Cache turned off

Insufficient space

Improper RAID configuration

Mis-matched drives

Backplane failure

Storage tools

Partitioning tools

Disk management

RAID array management

Array management

System logs

Net use/mount command

Monitoring tools

7.6 Given a scenario, effectively diagnose security issues, selecting the appropriate tools and methods

Common problems

File integrity issue

Privilege escalation

Applications will not load

Can’t access network file/shares

Unable to open files

Excessive access

Excessive memory utilization

Causes of common problems

Open ports

Active services

Inactive services

Intrusion detection configurations

Anti-malware configurations

Local/group policies

Firewall rules

Misconfigured permissions

Virus infection

Rogue processes/services

Security tools

Port scanners

Sniffers

Cipher

Checksums

Telnet client

Anti-malware

Objective Map

The following objective map shows you where the exam objectives are covered in the chapters. Use it as a reference to find the information you’re looking for.

CompTIA Server + Study Guide

SK0-004 Exam Objectives

Objective

Chapter

1.0 Server Architecture

1.1 Explain the purpose and function of server form factors

1

1.2 Given a scenario, install, configure and maintain server components

1

1.3 Compare and contrast power and cooling components

1

2.0 Server Administration

2.1 Install and configure server operating systems

2

2.2 Compare and contrast server roles and requirements for each

3

2.3 Given a scenario, use access and control methods to administer a server

2

2.4 Given a scenario, perform proper server maintenance techniques

3

2.5 Explain the importance of asset management and documentation

3

2.6 Explain the purpose and operation of virtualization components

2

3.0 Storage

3.1 Given a scenario, install and deploy primary storage devices based on given specifications and interfaces

4

3.2 Given a scenario, configure RAID using best practices

5

3.3 Summarize hardware and features of various storage technologies

4

3.4 Given a scenario, calculate appropriate storage capacity and plan for future growth

5

4.0 Security

4.1 Compare and contrast physical security methods and concepts

6

4.2 Given a scenario, apply server hardening techniques

6

4.3 Explain basic network security systems and protocols

7

4.4 Implement logical access control methods based on company policy

7

4.5 Implement data security methods and secure storage disposal techniques

7

4.6 Given a scenario, implement proper environmental controls and techniques

6

5.0 Networking

5.1 Given a scenario, configure servers to use IP addressing and network infrastructure services

8

5.2 Compare and contrast various ports and protocols

8

5.3 Given a scenario, install cables and implement proper cable management procedures

8

6.0 Disaster Recovery

6.1 Explain the importance of disaster recovery principles

9

6.2 Given a scenario, implement appropriate backup techniques

9

7.0 Troubleshooting

7.1 Explain troubleshooting theory and methodologies

10

7.2 Given a scenario, effectively troubleshoot hardware problems, selecting the appropriate tools and methods

10

7.3 Given a scenario, effectively troubleshoot software problems, selecting the appropriate tools and methods

10

7.4 Given a scenario, effectively diagnose network problems, selecting the appropriate tools and methods

11

7.5 Given a scenario, effectively troubleshoot storage problems, selecting the appropriate tools and methods

12

7.6 Given a scenario, effectively diagnose security issues, selecting the appropriate tools and methods

11

   Exam specifications and content are subject to change at any time without prior notice and at CompTIA’s sole discretion. Please visit CompTIA’s website (www.comptia.org) for the most current information on the exam content.

Assessment Test

Which of the following is not part of the form factor of a server?

SizeAppearanceDimensionsSecurity

Which function is made easier when a server has a rail kit?

InstallationMaintenanceConfigurationAccessing

Which of the following is the unit of measurement when discussing rack components?

MIUC

Which of the following is another term for RAID 1?

DuplicatingDoublingDuplexingMirroring

What is the primary function of PXE?

Remote bootingSecure routingRemote administrationRedundant connections

Shares are used to allocate which of the following to VMs?

ROMCPUNVRAML2 cache

What is the most common protocol a SAN uses?

IPXIPEthernetFibre Channel

Which of the following is true of a NAS?

A NAS has lower latency and higher reliability than a SAN.A NAS typically supports only RAID 5.A NAS does not support high throughput.Implementing a NAS is inexpensive.

To which protocol is the term LUN related?

SCSIIPSSLFDDI

What is the role of a DHCP server in a network?

Issues IP configurationsTranslates private to public addressesAuthenticates usersResolves IP addresses to hostnames

The metric IOPS is used to describe the performance of which resource?

MemoryDiskCPUNetwork

As the number of users assigned to a printer increases, which resource should be increased?

DiskMetworkCPUMemory

What is the function of the command-line utility wevtutil?

Manages log filesManages network connectionsManages memory issuesManages CPU affinity

Which of the following is deleted when you execute Disk Cleanup?

Temp filesMemoryRouting tablesPagefile

Which RAID version requires at least three drives?

RAID 0RAID 1RAID 5RAID 10

Which of the following statements is true with respect to safes?

No safes are fireproof.Consumer Reports assigns ratings to safes that you can use to assess the suitability of the safe.Those that are fire resistant will protect a backup tape from being damaged.When considering a safe, you should focus on two items: the cost and the size.

Which of the following is true of an HIDS?

A high number of false negatives can cause a lax attitude on the part of the security team.An HIDS cannot address authentication issues.Encrypted packets can be analyzed.An HIDS monitors only traffic destined for the machine on which it is installed.

The MBSA vulnerability scanner works on which operating system only?

LinuxWindowsUnixMac

Which of the following would Joe use to digitally sign a document so that Sally can verify his signature?

Joe’s private keySally’s private keyJoe’s public keySally’s public key

Which authentication mechanism is an example of something you are?

PasswordUsernameSmartcardRetina scan

What is a common host-based firewall on Linux-based systems?

iptablesnessustripwirescannow

Which of the following can be accomplished using port security?

Set the minimum number of MAC addresses that can be seen on a portSet the maximum number of IP addresses that can be seen on a portDefine exactly which MAC addresses are not allowed on the portSet the maximum number of MAC addresses that can be seen on a port

When discussing 802.1x, which of the following roles is played by the user’s computer?

SupplicantAuthenticatorAuthentication serverImperative

Which is the minimum category of cable required for 100 Mbps transmissions?

CAT3CAT5CAT5eCAT6

Which of the following services uses port number 443?

SFTPNTPHTTPHTTPS

What issue does the 802.1ax-2008 standard address?

NIC teamingDeterministic routingSecure DNSMIMO

Which of the following parts of a MAC address is unique for each interface made by a vendor?

UAABAAOUIEUI-64

How many sets of backup tapes are used in the GFS system?

2345

When creating a backup, what function can be used to verify the integrity of the results?

ChecksumsEncryptionDigital signaturesTransaction logs

If you perform a full backup once a week and use a differential backup scheme the rest of the week, how many tapes are required for a restore four days after the Full backup is taken?

1234

Which of the following components is the one you most likely would measure with a multimeter?

NICHard drivePower supplyCPU

What can be the result of high humidity?

CorrosionESDRFIEMI

Which of the following is not true about server backplanes?

They can be a single point of failure.They provide data and control signal connectors for CPU.Backplane failures are uncommon.You should implement redundant backplanes.

Which of the following steps in the CompTIA troubleshooting method come first?

Verify full system functionality and, if applicable, implement preventive measures.Document findings, actions, and outcomes throughout the process.Identify the problem and determine the scope.Perform a root cause analysis.

Which command is used on a Windows computer to identify the path taken to a destination network?

traceroutetracertipconfig/tracetrace

On which type of device is port security used?

HubSwitchRouterMultiplexer

You receive a destination unreachable message with a source IP address. Where is it coming from?

A remote routerA remote DNS serverA local DNS serverThe local router

The sudo fdisk -l command lists the partitions on what type of system?

WindowsMacNovellLinux

In Linux, what is fstab used for?

To mount partitions in bootTo create partitionsTo format a partitionTo defragment a drive

What component locates the operating system in Linux?

NTLDRGRUBBootmgrboot.ini

Answers to Assessment Test

D. Form factor refers to the physical appearance and dimensions of the server.

B. Rail kits, when implemented, allow for the server to be slid out of the rack for maintenance.

C. Each U is 1.75 inches (4.445 cm) high.

D. RAID 1 is also known as disk mirroring. This is a method of producing fault tolerance by writing all data simultaneously to two separate drives.

A. The Preboot Execution Environment (PXE) is an industry standard client/server interface that allows networked computers that are not yet loaded with an operating system to be configured and booted remotely by an administrator.

B. There are three ways the allocation of the use of the physical CPU(s) can be controlled. These methods are as follows: