38,99 €
NOTE: The correct URL to access the Sybex interactive online test bank and study tools is www.wiley.com/go/sybextestprep. The book's back cover, Introduction, and last page in the book provided the wrong URL. We apologize for any confusion and inconvenience this may have caused you. Comprehensive interactive exam preparation plus expert insight from the field CompTIA Server+ Study Guide Exam SK0-004 is your ideal study companion for the SK0-004 exam. With 100% coverage of all exam objectives, this guide walks you through system hardware, software, storage, best practices, disaster recovery, and troubleshooting, with additional coverage of relevant topics including virtualization, big data, cloud storage, security, and scalability. Get an 'in the trenches' view of how server and data storage administration works in a real-world IT environment. From the basics through advanced topics, you'll learn how to deliver world-class solutions in today's evolving organizations by getting under the hood of technologies that enable performance, resiliency, availability, recoverability, and simplicity. Gain access to the Sybex interactive online learning environment, which features electronic flashcards, a searchable glossary, test bank, and bonus practice exams to reinforce what you have learned. Using and understanding in-house storage devices and the cloud has become an urgent skill for any IT professional. This is your comprehensive, expert driven study guide for taking the CompTIA Server+ exam SK0-004 * Study 100% of exam objectives and more * Understand storage design, implementation, and administration * Utilize bonus practice exams and study tools * Gain a real-world perspective of data storage technology CompTIA Server+ Study Guide Exam SK0-004 is your ticket to exam day confidence.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 706
Veröffentlichungsjahr: 2016
Troy McMillan
Senior Acquisitions Editor: Kenyon Brown Development Editor: David Clark Technical Editors: Robin Abernathy and Quentin Docter Production Editor: Christine O'Connor Copy Editor: Elizabeth Welch Editorial Manager: Mary Beth Wakefield Production Manager: Kathleen Wisor Executive Editor: Jim Minatel Book Designers: Judy Fung and Bill Gibson Proofreader: Rebecca Rider Indexer: John Sleeva Project Coordinator, Cover: Brent Savage Cover Designer: Wiley Cover Image: Getty Images Inc./Jeremy Woodhouse
Copyright © 2016 by John Wiley & Sons, Inc., Indianapolis, Indiana
Published simultaneously in Canada
ISBN: 978-1-119-13782-5 ISBN: 978-1-119-13784-9 (ebk.) ISBN: 978-1-119-13783-2 (ebk.)
Manufactured in the United States of America
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.
Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Web site may provide or recommendations it may make. Further, readers should be aware that Internet Web sites listed in this work may have changed or disappeared between when this work was written and when it is read.
For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S. at (877) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002.
Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at http://booksupport.wiley.com. For more information about Wiley products, visit www.wiley.com.
Library of Congress Control Number: 2016940086
TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. CompTIA and Server+ are registered trademarks of CompTIA Properties, LLC. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.
For my wife Heike, who makes the hard work all worth it
Special thanks go to David Clark for keeping me on schedule and ensuring all the details are correct. Also I’d like to thank Robin Abernathy and Quentin Docter for the excellent technical edit that saved me from myself at times. Finally, as always I’d like to acknowledge Kenyon Brown for his continued support of all my writing efforts.
Troy McMillan writes practice tests, study guides, and online course materials for Kaplan IT Cert Prep, while also running his own consulting and training business. He holds over 30 industry certifications. Troy can be reached at [email protected].
Introduction
What Does This Book Cover?
The CompTIA Server+ Exam Objectives
CompTIA SK0-004 Exam
Assessment Test
Answers to Assessment Test
Chapter 1 Server Hardware
Server Form Factors
Installing and Configuring Server Components
Maintaining Power and Cooling Requirements
Summary
Exam Essentials
Review Questions
Chapter 2 Installing and Configuring Servers
Installing and Configuring Server Operating Systems
Using Access and Control Methods to Administer a Server
Purpose and Operation of Virtualization Components
Summary
Exam Essentials
Review Questions
Chapter 3 Server Maintenance
Server Roles and Requirements
Proper Server Maintenance Techniques
Asset Management and Documentation
Summary
Exam Essentials
Review Questions
Chapter 4 Storage Technologies
Hardware and Features of Various Storage Technologies
Installing and Deploying Primary Storage Devices
Summary
Exam Essentials
Review Questions
Chapter 5 Identifying Capacity and Fault Tolerance Requirements
Calculating Appropriate Storage Capacity and Planning for Future Growth
Configuring RAID
Summary
Exam Essentials
Review Questions
Chapter 6 Securing the Server
Physical Security Methods and Concepts
Server Hardening Techniques
Proper Environmental Controls and Techniques
Summary
Exam Essentials
Review Questions
Chapter 7 Securing Server Data and Network Access
Basic Network Security Systems and Protocols
Logical Access Control Methods
Data Security Methods and Secure Storage Disposal Techniques
Summary
Exam Essentials
Review Questions
Chapter 8 Networking
Configuring Servers to Use IP Addressing and Network Infrastructure Services
Ports and Protocols
Cable Management Procedures
Summary
Exam Essentials
Review Questions
Chapter 9 Disaster Recovery
Disaster Recovery Principles
Backup
Summary
Exam Essentials
Review Questions
Chapter 10 Troubleshooting Hardware and Software Issues
Troubleshooting Theory and Methodologies
Troubleshooting Hardware Problems
Troubleshooting Software Problems
Summary
Exam Essentials
Review Questions
Chapter 11 Troubleshooting Connectivity Issues
Diagnosing Network Problems
Diagnosing Security Issues
Summary
Exam Essentials
Review Questions
Chapter 12 Troubleshooting Storage Issues
Troubleshooting Storage Problems
Summary
Exam Essentials
Review Questions
Appendix Answers to Review Questions
Chapter 1: Server Hardware
Chapter 2: Installing and Configuring Servers
Chapter 3: Server Maintenance
Chapter 4: Storage Technologies
Chapter 5: Identifying Capacity and Fault Tolerance Requirements
Chapter 6: Securing the Server
Chapter 7: Securing Server Data and Network Access
Chapter 8: Networking
Chapter 9: Disaster Recovery
Chapter 10: Troubleshooting Hardware and Software Issues
Chapter 11: Troubleshooting Connectivity Issues
Chapter 12: Troubleshooting Storage Issues
Advert
EULA
Chapter 1
Table 1.1
Table 1.2
Table 1.3
Chapter 4
Table 4.1
Table 4.2
Table 4.3
Table 4.4
Chapter 5
Table 5.1
Table 5.2
Chapter 7
Table 7.1
Table 7.2
Table 7.3
Chapter 8
Table 8.1
Table 8.2
Table 8.3
Table 8.4
Chapter 11
Table 11.1
Chapter 12
Table 12.1
Chapter 1
Figure 1.1
Server in a rack
Figure 1.2
A 4U server
Figure 1.3
Cable management arm
Figure 1.4
Rail kit installation
Figure 1.5
Tower server
Figure 1.6
Tower server in a rack
Figure 1.7
Rack vs. blade
Figure 1.8
Blade enclosure
Figure 1.9
Midplane
Figure 1.10
Midplane power
Figure 1.11
Advanced management module
Figure 1.12
Inserting a blade server and filler
Figure 1.13
PGA and LGA
Figure 1.14
Dual-channel memory slots
Figure 1.15
PCI slots
Figure 1.16
Comparison of PCI slot types
Figure 1.17
Traditional and CNA
Figure 1.18
Magnetic hard drive
Figure 1.19
CHS
Figure 1.20
Hybrid approaches
Figure 1.21
Riser card in rack server
Figure 1.22
RAID controller
Figure 1.23
CMOS battery in a server
Figure 1.24
Voltage switch
Figure 1.25
Edison plug
Figure 1.26
Locking plug
Figure 1.27
Hot aisle/cold aisle configuration
Figure 1.28
Baffles
Figure 1.29
Rack fans
Figure 1.30
Liquid cooling
Chapter 2
Figure 2.1
View/Add Configuration
Figure 2.2
Confirming the drive additions
Figure 2.3
Array configuration screen
Figure 2.4
Selecting the RAID level
Figure 2.5
Creating a partition
Figure 2.6
Running an application as administrator
Figure 2.7
Using
runas
Figure 2.8
Joining the server to the domain
Figure 2.9
Adding a role in Server Manager
Figure 2.10
Seven-day Memory Pages Per Second report
Figure 2.11
PXE boot process
Figure 2.12
Standard KVM switch
Figure 2.13
Serial device server
Figure 2.14
VMware Server Console
Figure 2.15
VMM in Windows Hyper-V
Figure 2.16
KVM over IP
Figure 2.17
iLO port
Figure 2.18
iDRAC port
Figure 2.19
iDRAC console
Figure 2.20
RDCMan
Figure 2.21
Hosts and guest
Figure 2.22
Oracle VM VirtualBox
Figure 2.23
Type I and II hypervisors
Figure 2.24
Container-based virtualization
Figure 2.25
Enabling hardware-assisted virtualization
Figure 2.26
Setting CPU allocations in Hyper-V
Figure 2.27
Shared storage
Figure 2.28
Creating a virtual disk in Hyper-V
Figure 2.29
Citrix dynamic memory allocation
Figure 2.30
NAT vs. bridged
Figure 2.31
vSwitch
Figure 2.32
Assigning a vSwitch to physical adapters
Figure 2.33
Increasing video memory
Chapter 3
Figure 3.1
Three tiers
Figure 3.2
Deduplication techniques
Figure 3.3
Log forwarding
Figure 3.4
LEDs
Figure 3.5
Dell LCD
Figure 3.6
IBM Light path diagnostics
Figure 3.7
Active/active cluster
Figure 3.8
Active/passive cluster
Figure 3.9
Round robin load balancing
Figure 3.10
Heartbeat connection
Figure 3.11
Enterprise architecture diagram
Figure 3.12
Data flow for order entry
Chapter 4
Figure 4.1
Storage technologies
Figure 4.2
Fiber HBA
Figure 4.3
LUN masking
Figure 4.4
Classic SAN and SAN with iSCSI
Figure 4.5
FCoE and iSCSI
Figure 4.6
JBOD
Figure 4.7
Tape library
Figure 4.8
SAS cabling
Figure 4.9
SAS system receptacle with the SATA HDD plug
Figure 4.10
SCSI interfaces
Figure 4.11
USB to SCSI
Figure 4.12
Fiber switch
Chapter 5
Figure 5.1
Disk quotas
Figure 5.2
Disk compression
Figure 5.3
Event Log properties
Figure 5.4
Hierarchical storage systems
Figure 5.5
RAID 0
Figure 5.6
RAID 1
Figure 5.7
RAID 5
Figure 5.8
RAID 6
Figure 5.9
RAID 10
Figure 5.10
Hardware and software RAID
Figure 5.11
Battery-backed cache
Figure 5.12
Redundant RIAD controller
Chapter 6
Figure 6.1
Mantrap
Figure 6.2
Cabinet lock with alarm
Figure 6.3
Rack mount lock
Figure 6.4
Tower server lock
Figure 6.5
Tower cabinet
Figure 6.6
MBSA results
Figure 6.7
Nessus output
Figure 6.8
Disabling USB ports in Device Manager
Figure 6.9
Disabling USB ports in the BIOS
Figure 6.10
Expanding the Network adaptors category
Figure 6.11
Disable adaptor
Figure 6.12
Setting a BIOS password
Figure 6.13
Disabling WOL
Figure 6.14
Accessing boot settings
Figure 6.15
Changing the boot order
Figure 6.16
Open case warning in the BIOS
Figure 6.17
Automatic shutdown
Figure 6.18
Checking battery level
Figure 6.19
Maintenance bypass
Figure 6.20
Installing the remote management card
Figure 6.21
Rack PDU
Figure 6.22
Redundant PDUs
Figure 6.23
Multiple circuits
Figure 6.24
Redundant UPS with single PDU
Figure 6.25
Proper ESD strap connection
Figure 6.26
Proper use of an ESD mat
Figure 6.27
Wet and dry systems
Figure 6.28
Rack stabilizer
Figure 6.29
Pinch point warning
Figure 6.30
Rack monitor
Figure 6.31
Rack fillers or filler panels
Figure 6.32
Baffles
Figure 6.33
Blanking panels
Figure 6.34
Hot aisle and cold aisle
Chapter 7
Figure 7.1
A proxy firewall blocking network access from external networks
Figure 7.2
A dual-homed firewall segregating two networks from each other
Figure 7.3
802.1x process
Figure 7.4
Microsoft Network Access Protection
Figure 7.5
USB policies
Chapter 8
Figure 8.1
DHCP relay agent
Figure 8.2
TCP/IP properties
Figure 8.3
DNS tab
Figure 8.4
Adding a domain suffix to the search list
Figure 8.5
Group Policy
Figure 8.6
DNS client settings
Figure 8.7
Primary DNS suffix
Figure 8.8
WINS tab
Figure 8.9
Adding the WINS server
Figure 8.10
MAC address output
Figure 8.11
OUI and UAA
Figure 8.12
Server Manager
Figure 8.13
NIC Teaming
Figure 8.14
New Team
Figure 8.15
NIC team settings
Figure 8.16
New NIC team
Figure 8.17
Setting Speed & Duplex
Figure 8.18
Twisted pair cable
Figure 8.19
Pin assignments for T568A and T568B
Figure 8.20
Rollover pin-out
Figure 8.21
Fiber connectors ST, SC, and LC
Figure 8.22
Fiber SFP
Figure 8.23
HP 2-port server adapter
Figure 8.24
RJ-45 and an RJ-11 connector
Figure 8.25
Cable channel
Figure 8.26
Attaching cable to vertical trays
Figure 8.27
Horizontal cable tray
Figure 8.28
Cable ties
Chapter 9
Figure 9.1
Disk to disk
Figure 9.2
Server to server
Figure 9.3
Site to site
Figure 9.4
Grandfather/father/son
Chapter 10
Figure 10.1
Selecting Run Diags
Figure 10.2
Test one device
Figure 10.3
Dust builds up inside the system.
Figure 10.4
Service dependencies
Figure 10.5
Run as Administrator
Figure 10.6
System
Figure 10.7
System Properties Advanced tab
Figure 10.8
Performance Options
Figure 10.9
Virtual memory settings
Figure 10.10
Tools menu
Figure 10.11
The opening interface of Event Viewer
Figure 10.12
Event log Properties
Figure 10.13
Resource Monitor
Figure 10.14
Memory tab
Figure 10.15
Adding a counter
Figure 10.16
Drive Optimization tool
Figure 10.17
Disk Management
Figure 10.18
Initialize disk pop-up
Figure 10.19
Initialize disk
Figure 10.20
Shrink Volume
Figure 10.21
Set volume size
Figure 10.22
Change Drive Letter
Chapter 11
Figure 11.1
Pinging the conflicted address
Figure 11.2
Using
arp -a
to identify the MAC address
Figure 11.3
Network and Sharing Center
Figure 11.4
Set Up A New Connection Or Network
Figure 11.5
Manually connecting to a wireless network
Figure 11.6
Wireshark
Figure 11.7
Frame details
Figure 11.8
ICMP codes
Figure 11.9
The ping command
Figure 11.10
Using tracert
Figure 11.11
Using ipconfig
Figure 11.12
ifconfig
Figure 11.13
Typing
net use
lets you see what is currently shared.
Figure 11.14
Using nbtstat
Figure 11.15
Using netstat
Figure 11.16
Service dependencies
Figure 11.17
gpresult
Figure 11.18
Task Manager
Figure 11.19
Zenmap
Figure 11.20
Nmap command line
Figure 11.21
Wireshark
Figure 11.22
Programs And Features
Figure 11.23
Turn Windows Features On Or Off
Chapter 12
Figure 12.1
top
output
Figure 12.2
Enabling write-back cache in Windows
Figure 12.3
Using
fdisk
Figure 12.4
Actions menu
Figure 12.5
Status in Disk Management
Figure 12.6
Initialize Disk pop-up
Figure 12.7
Initializing a disk
Figure 12.8
Shrink Volume
Figure 12.9
Setting the volume size
Figure 12.10
Change Drive Letter And Paths
Figure 12.11
The Select Drives To Create A Storage Pool page
Figure 12.12
Creating a storage space
Figure 12.13
HP Array Configuration Utility
Figure 12.14
Solarwinds Storage Manager
Cover
Table of Contents
Chapter
xx
xxi
xxii
xxiii
xxiv
xxv
xxvi
xxvii
xxviii
xxix
xxx
xxxi
xxxii
xxxiii
xxxiv
xxxv
xxxvi
xxxvii
xxxviii
xxxix
xl
xli
xlii
xliii
xliv
xlv
xlvi
xlvii
xlviii
xlix
l
li
lii
liii
liv
lv
lvi
lvii
lviii
lix
lx
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
85
86
87
88
89
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
242
243
244
245
246
247
248
249
250
251
253
254
255
256
257
258
259
260
262
264
265
267
268
269
270
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
354
355
356
357
358
359
360
361
362
363
365
366
367
368
369
370
371
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
390
391
392
393
394
395
396
397
398
399
400
401
402
404
405
406
407
408
409
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
The Server+ certification program was developed by the Computing Technology Industry Association (CompTIA) to provide an industry-wide means of certifying the competency of computer server technicians. The Server+ certification, which is granted to those who have attained the level of knowledge and troubleshooting skills that are needed to provide capable support to the most commonly used server and storage systems, is similar to other certifications in the computer industry. The theory behind these certifications is that if you needed to have service performed on any of their products, you would sooner call a technician who has been certified in one of the appropriate programs than you would just call the first so-called “expert” in the phone book.
CompTIA’s Server+ exam objectives are periodically updated to keep the certification applicable to the most recent hardware and software. This is necessary because a technician must be able to work on the latest equipment. The most recent revisions to the objectives—and to the whole program—were introduced in 2015 and are reflected in this book.
This book and Sybex’s CompTIA Server+ Complete Study Guide (both the Standard and Deluxe Editions) are tools to help you prepare for this certification—and for the new areas of focus of a modern server technician’s job.
The Server+ certification program was created to offer a wide-ranging certification, in the sense that it’s intended to certify competence with servers from many different makers/ vendors. Everyone must take and pass one exam: SK0-004.
The Server+ certification isn’t awarded until you’ve passed the test. For the latest pricing on the exams and updates to the registration procedures, call Pearson VUE at (877) 551-7587. You can also go to the website, www.vue.com, for additional information or to register online. If you have further questions about the scope of the exams or related CompTIA programs, refer to the CompTIA website at www.comptia.org.
If you want to acquire a solid foundation in servers and the storage systems they use, and your goal is to prepare for the exams by filling in any gaps in your knowledge, this book is for you. You’ll find clear explanations of the concepts you need to grasp and plenty of help to achieve the high level of professional competency you need in order to succeed in your chosen field.
If you want to become certified as a Server+ holder, this book is definitely what you need. However, if you just want to attempt to pass the exam without really understanding the basics of personal computers, this guide isn’t for you. It’s written for people who want to acquire skills and knowledge of servers and storage systems.
This book covers everything you need to know to pass the CompTIA Server+ exam.
We’ve included several learning tools throughout the book:
Objective map and opening list of objectives We have included a detailed exam objective map showing you where each of the exam objectives is covered. In addition, each chapter opens with a list of the exam objectives it covers. Use these resources to see exactly where each of the exam topics is covered.
Assessment test We have provided an assessment test that you can use to check your readiness for the exam at the end of this Introduction. Take this test before you start reading the book; it will help you determine the areas on which you might need to brush up. The answers to the assessment test questions appear on a separate page after the last question of the test. Each answer includes an explanation and a note telling you the chapter in which the material appears.
Exam essentials Each chapter, just before the summary, includes a number of exam essentials. These are the key topics that you should take from the chapter in terms of areas on which you should focus when preparing for the exam.
Chapter Review Questions To test your knowledge as you progress through the book, there are review questions at the end of each chapter. As you finish each chapter, answer the review questions and then check your answers—the correct answers appear in the Appendix. You can go back to reread the section that deals with each question you got wrong to ensure that you answer correctly the next time you’re tested on the material.
The interactive online learning environment that accompanies CompTIA Server+ Exam SK0-004 provides a test bank with study tools to help you prepare for the certification exams and increase your chances of passing them the first time! The test bank includes the following elements:
Sample tests All of the questions in this book are provided, including the assessment test, which you’ll find at the end of this introduction, and the chapter tests that include the review questions at the end of each chapter. In addition, there are two practice exams. Use these questions to test your knowledge of the study guide material. The online test bank runs on multiple devices.
Flashcards One set of questions is provided in digital flashcard format (a question followed by a single correct answer). You can use the flashcards to reinforce your learning and provide last-minute test prep before the exam.
Glossary The key terms from this book and their definitions are available as a fully searchable PDF.
Go to www.wiley.com/go/sybextestprep to register and gain access to this interactive online learning environment and test bank with study tools.
If you want a solid foundation for preparing for the Server+ exam, this is the book for you. I’ve spent countless hours putting together this book with the sole intention of helping you prepare for the exams.
This book is loaded with valuable information, and you will get the most out of your study time if you understand how we put the book together. Here’s a list that describes how to approach studying:
Take the assessment test immediately following this introduction. It’s okay if you don’t know any of the answers—that’s what this book is for. Carefully read over the explanations for any question you get wrong, and make note of the chapters where that material is covered.
Study each chapter carefully, making sure you fully understand the information and the exam objectives listed at the beginning of each one. Again, pay extra-close attention to any chapter that includes material covered in questions you missed on the assessment test.
Read over the summary and exam essentials. These will highlight the sections from the chapter with which you need to be familiar before sitting for the exam.
Answer all of the review questions at the end of each chapter. Specifically note any questions that confuse you, and study the corresponding sections of the book again. Don’t just skim these questions! Make sure that you understand each answer completely.
Go over the electronic flashcards. These help you prepare for the latest Server+ exam, and they’re really great study tools.
Take the practice exam.
CompTIA includes performance-based questions on the Server+ exams. These are not the traditional multiple-choice questions with which you’re probably familiar. These questions require the candidate to know how to perform a specific task or series of tasks. The candidate will be presented with a scenario and will be asked to complete a task. They will be taken to a simulated environment where they will have to perform a series of steps and will be graded on how well they complete the task.
Here are some general tips for taking your exams successfully:
Bring two forms of ID with you. One must be a photo ID, such as a driver’s license. The other can be a major credit card or a passport. Both forms must include a signature.
Arrive early at the exam center so you can relax and review your study materials, particularly tables and lists of exam-related information.
Read the questions carefully. Don’t be tempted to jump to an early conclusion. Make sure you know exactly what the question is asking.
Don’t leave any unanswered questions. Unanswered questions are scored against you.
There will be questions with multiple correct responses. When there is more than one correct answer, a message at the bottom of the screen will prompt you to either “Choose two” or “Choose all that apply.” Be sure to read the messages displayed to know how many correct answers you must choose.
When answering multiple-choice questions you’re not sure about, use a process of elimination to get rid of the obviously incorrect answers first. Doing so will improve your odds if you need to make an educated guess.
On form-based tests (nonadaptive), because the hard questions will eat up the most time, save them for last. You can move forward and backward through the exam.
For the latest pricing on the exams and updates to the registration procedures, visit CompTIA’s website at
www.comptia.org
.
CompTIA goes to great lengths to ensure that its certification programs accurately reflect the IT industry’s best practices. The company does this by establishing Cornerstone Committees for each of its exam programs. Each committee consists of a small group of IT professionals, training providers, and publishers who are responsible for establishing the exam’s baseline competency level and who determine the appropriate target audience level.
Once these factors are determined, CompTIA shares this information with a group of hand-selected Subject Matter Experts (SMEs). These folks are the true brainpower behind the certification program. They review the committee’s findings, refine them, and shape them into the objectives you see before you. CompTIA calls this process a Job Task Analysis (JTA).
Finally, CompTIA conducts a survey to ensure that the objectives and weightings truly reflect the job requirements. Only then can the SMEs go to work writing the hundreds of questions needed for the exam. And, in many cases, they have to go back to the drawing board for further refinements before the exam is ready to go live in its final state. So, rest assured, the content you’re about to learn will serve you long after you take the exam.
Exam objectives are subject to change at any time without prior notice and at CompTIA’s sole discretion. Please visit the certification page of CompTIA’s website at www.comptia.org for the most current listing of exam objectives.
CompTIA also publishes relative weightings for each of the exam’s objectives. The following tables list the objective domains and the extent to which they’re represented on each exam.
SK0-004 Exam Domains
% of Exam
1.0 Server Architecture
12%
2.0 Server Administration
24%
3.0 Storage
12%
4.0 Security
13%
5.0 Networking
10%
6.0 Disaster Recovery
9%
7.0 Troubleshooting
20%
Total
100%
The following sections look at the objectives beneath each of these domains in more detail.
Rack mount
Dimensions
1U, 2U, 4U
Cable management arms
Rail kits
Tower
Blade technology
Blade enclosure
Backplane/Midplane
Power supply sockets
Network modules/switches
Management modules
Blade server
CPU
Multiprocessor vs. multicore
Socket type
Cache levels: L1, L2, L3
Speeds
Core
Bus
Multiplier
CPU stepping
Architecture
x86
x64
ARM
RAM
ECC vs. non-ECC
DDR2, DDR3
Number of pins
Static vs. dynamic
Module placement
CAS latency
Timing
Memory pairing
Bus types, bus channels, and expansion slots
Height differences and bit rate differences
PCI
PCIe
PCI-X
NICs
Hard drives
Riser cards
RAID controllers
BIOS/UEFI
CMOS battery
Firmware
USB interface/port
Hotswap vs. non-hotswap components
Power
Voltage
110v vs. 220v vs. –48v
208v vs. 440v/460v/480v
Wattage
Consumption
Redundancy
1-phase vs. 3-phase power
Plug types
NEMA
Edison
Twist lock
Cooling
Airflow
Thermal dissipation
Baffles/shrouds
Fans
Liquid cooling
Determine server role/purpose
Update firmware
BIOS/UEFI configuration
Boot order
Disk preparation
RAID setup
Partitioning
Formatting
File system type
Ext 2, 3, 4
NTFS
FAT32
ReiserFS
UFS
VMFS
ZFS
Swap
Configure host name
Local account setup
Connect to network
Join domain/directory
Address security concerns
Patching
OS hardening
Compliance to company procedures/standards
Enable services
Install features/roles/applications/drivers
Performance baseline
Server optimization
Swap or pagefile optimization
Unattended/remote installations
Deploying images and cloning
Scripted installs
PXE boot
TFTP
Web server
Application server
Directory server
Database server
File server
Print server
Messaging server
Mail server
Routing and remote access server
Network services server
DHCP
DNS/WINS
NTP
Local hardware administration
KVM
Serial
Virtual Administration console
Network-based hardware administration
KVM over IP
ILO
iDRAC
Network-based operating system administration
RDP
SSH
VNC
Command line/shell
Change management
Patch management
Operating System updates
Application updates
Security software updates
Firmware updates
Device drivers updates
Compatibility lists
Operating systems
Hardware
Applications
Testing and validation
Outages and service level agreements
Scheduled downtime
Unscheduled downtime
Impact analysis
Client notification
MTTR
Performance monitoring
CPU utilization
Memory utilization
Network utilization
Disk utilization
Disk IOPS
Storage capacity
Comparison against performance baseline
Processes and services monitoring
Log monitoring
Hardware maintenance
Check system health indicators
LEDs
Error codes
Beep codes
LCD messages
Replace failed components
Fans
Hard drives
RAM
Backplanes
Batteries
Preventative maintenance
Clearing dust
Check proper air flow
Proper shut down procedures
Fault tolerance and high availability techniques
Clustering
Active/active
Active/passive
Load balancing
Round robin
Heartbeat
Asset management
Licensing
Labeling
Warranty
Life cycle management
Procurement
Usage
End of life
Disposal/recycling
Inventory
Make
Model
Serial number
Asset tag
Documentation
Service manuals
Network diagrams
Architecture diagrams
Dataflow diagrams
Recovery documentation
Baseline documentation
Change management policies
Service Level Agreement
Server configuration
Secure storage of sensitive documentation
Hosts and guests
Management interface for virtual machines
Hypervisor
Type I
Type II
Hybrid
Hardware compatibility list
BIOS/UEFI compatibility and support
CPU compatibility support
AMD-V/Intel VT
Resource allocation between Guest and Host
CPU
Storage
Memory
Network connectivity
Direct Access (Bridging) vs. NAT
Virtual NICs
Virtual switches
Video
Disk specifications
RPM
Dimensions/form factor
Capacity
Bus width
IOPS
Seek time and latency
Hotswap vs. non-hotswap components
Interfaces
SAS
SATA
SCSI
USB
Fibre Channel
Hard drive vs. SSD
RAID levels and performance considerations
0
1
5
6
10
Software vs. hardware RAID
Performance considerations
Configuration specifications
Capacity
Bus types
Drive RPM
Hotswap support and ramifications
Hot spare vs. cold spare
Array controller
Memory
Battery backed cache
Redundant controller
DAS
NAS
iSCSI
FCoE
SAN
Fibre Channel
LUN and LUN masking
HBAs and fabric switches
JBOD
Tape
Drive
Libraries
Optical drive
Flash, Compact Flash, and USB drive
Base10 vs. Base2 disk size calculation (1000 vs. 1024)
Disk quotas
Compression
Capacity planning considerations:
Operating system growth
Patches
Service packs
Log files
Temporary directories
Databases
Application servers
File servers
Archival
Multifactor Authentication
Something you have
Something you know
Something you are
Security concepts
Mantrap
RFID chip
ID card
Biometric
Keypad
Access list
Security guard
Security camera
Keys & Locks
Cabinet
Rack mount
Server
Safe
OS hardening
Stopping unneeded services/closing unneeded ports
Install only required software
Install latest operating system patches
Application hardening
Install latest patches
Disabling unneeded services/roles/features
Endpoint security
HIDS
Anti-malware
Remediate security issues based on a vulnerability scan
Hardware hardening
Disabling unneeded hardware and physical ports/devices
BIOS password
Disable WOL (Wake on LAN)
Set up boot order
Chassis locks/intrusion detection
Firewall
Network-based
Host-based
Port security/802.1x/NAC
Router access list
NIDS
Authentication protocols
LDAP
RADIUS
TACACS
TACACS+
PKI
Private key
Public key
Certificate authority
SSL/TLS
VPN
IPSEC
VLAN
Security zones
DMZ
Public and private
Intranet and extranet
Access control lists
Users
Groups
Roles
Resources
File system
Network ACLs
Peripheral devices
Administrative rights
Distribution lists
Permissions
Read
Write/Modify
Execute
Delete
Full control/Superuser
File vs. share
Storage encryption
File-level encryption
Disk encryption
Tape encryption
Storage media
Soft wipe
File deletion
Hard wipe
Zero out all sectors
Physical destruction
Remote wipe
Power concepts and best practices
UPS
Runtime vs. capacity
Automated graceful shutdown of attached devices
Periodic testing of batteries
Maximum load
Bypass procedures
Remote management
PDU
Connect redundant rack PDUs to separate circuits
Capacity planning
PDU ratings
UPS ratings
Total potential power draw
Multiple circuits
Connect redundant power supplies to separate PDUs
Safety
ESD procedures
Fire suppression
Proper lifting techniques
Rack stability
Floor load limitations
Sharp edges and pinch points
HVAC
Room and rack temperature and humidity
Monitoring and alert notifications
Air flow
Rack filler/baffle/blanking panels
Hot aisle and cold aisle
IPv4 vs. IPv6
Default gateway
CIDR notation and subnetting
Public and private IP addressing
Static IP assignment vs. DHCP
DNS
FQDN
Default domain suffix/search domain
WINS
NetBIOS
NAT/PAT
MAC addresses
Network Interface Card configuration
NIC teaming
Duplexing
Full
Half
Auto
Speeds
10/100/1000 Mbps
10 Gbps
TCP vs. UDP
SNMP 161
SMTP 25
FTP 20/21
SFTP 22
SSH 22
SCP 22
NTP 123
HTTP 80
HTTPS 443
TELNET 23
IMAP 143
POP3 110
RDP 3389
FTPS 989/990
LDAP 389/3268
DNS 53
DHCP 68
Copper
Patch cables
Crossover
Straight through
Rollover
CAT5
CAT5e
CAT6
Fiber
Singlemode
Multimode
Connectors
ST
LC
SC
SFP
RJ-45
RJ-11
Cable placement and routing
Cable channels
Cable management trays
Vertical
Horizontal
Labeling
Bend radius
Cable ties
Site types
Hot site
Cold site
Warm site
Replication methods
Disk to disk
Server to server
Site to site
Continuity of Operations
Disaster recovery plan
Business continuity plan
Business impact analysis
Who is affected
What is affected
Severity of impact
Methodology
Full/Normal
Copy
Incremental
Differential
Snapshot
Selective
Bare metal
Open file
Data vs. OS restore
Backup media
Linear Access
Tape
Random Access
Disk
Removable media
Optical media
Media and restore best practices
Labeling
Integrity verification
Test restorability
Tape rotation and retention
Media storage location
Offsite
Onsite
Security considerations
Environmental considerations
Identify the problem and determine the scope
Question users/stakeholders and identify changes to the server/environment
Collect additional documentation/logs
If possible, replicate the problem as appropriate
If possible, perform backups before making changes
Establish a theory of probable cause (question the obvious)
Determine whether there is a common element of symptom causing multiple problems
Test the theory to determine cause
Once theory is confirmed, determine next steps to resolve problem
If theory is not confirmed, establish new theory or escalate
Establish a plan of action to resolve the problem and notify impacted users
Implement the solution or escalate as appropriate
Make one change at a time and test/confirm the change has resolved the problem
If the problem is not resolved, reverse the change if appropriate and implement a new change
Verify full system functionality and if applicable implement preventative measures
Perform a root cause analysis
Document findings, actions and outcomes throughout the process
Common problems
Failed POST
Overheating
Memory failure
Onboard component failure
Processor failure
Incorrect boot sequence
Expansion card failure
Operating system not found
Drive failure
Power supply failure
I/O failure
Causes of common problems
Third-party components or incompatible components
Incompatible or incorrect BIOS
Cooling failure
Mismatched components
Backplane failure
Environmental issues
Dust
Humidity
Temperature
Power surge/failure
Hardware tools
Power supply tester (multimeter)
Hardware diagnostics
Compressed air
ESD equipment
Common problems
User unable to logon
User cannot access resources
Memory leak
BSOD/stop
OS boot failure
Driver issues
Runaway process
Cannot mount drive
Cannot write to system log
Slow OS performance
Patch update failure
Service failure
Hangs on shut down
Users cannot print
Cause of common problems
User Account Control (UAC/SUDO)
Corrupted files
Lack of hard drive space
Lack of system resources
Virtual memory (misconfigured, corrupt)
Fragmentation
Print server drivers/services
Print spooler
Software tools
System logs
Monitoring tools (resource monitor, performance monitor)
Defragmentation tools
Disk property tools (usage, free space, volume, or drive mapping)
Common problems
Internet connectivity failure
Email failure
Resource unavailable
DHCP server mis-configured
Non-functional or unreachable
Destination host unreachable
Unknown host
Default gateway mis-configured
Failure of service provider
Cannot reach by host name/FQDN
Causes of common problems
Improper IP configuration
VLAN configuration
Port security
Improper subnetting
Component failure
Incorrect OS route tables
Bad cables
Firewall (mis-configuration, hardware failure, software failure)
Mis-configured NIC, routing/switch issues
DNS and/or DHCP failure
Mis-configured hosts file
IPv4 vs. IPv6 misconfigurations
Networking tools
ping
tracert/traceroute
ipconfig/ifconfig
nslookup
net use/mount
route
nbtstat
netstat
Common problems
Slow file access
OS not found
Data not available
Unsuccessful backup
Error lights
Unable to mount the device
Drive not available
Cannot access logical drive
Data corruption
Slow I/O performance
Restore failure
Cache failure
Multiple drive failure
Causes of common problems
Media failure
Drive failure
Controller failure
HBA failure
Loose connectors
Cable problems
Mis-configuration
Improper termination
Corrupt boot sector
Corrupt file system table
Array rebuild
Improper disk partition
Bad sectors
Cache battery failure
Cache turned off
Insufficient space
Improper RAID configuration
Mis-matched drives
Backplane failure
Storage tools
Partitioning tools
Disk management
RAID array management
Array management
System logs
Net use/mount command
Monitoring tools
Common problems
File integrity issue
Privilege escalation
Applications will not load
Can’t access network file/shares
Unable to open files
Excessive access
Excessive memory utilization
Causes of common problems
Open ports
Active services
Inactive services
Intrusion detection configurations
Anti-malware configurations
Local/group policies
Firewall rules
Misconfigured permissions
Virus infection
Rogue processes/services
Security tools
Port scanners
Sniffers
Cipher
Checksums
Telnet client
Anti-malware
The following objective map shows you where the exam objectives are covered in the chapters. Use it as a reference to find the information you’re looking for.
CompTIA Server + Study Guide
SK0-004 Exam Objectives
Objective
Chapter
1.0 Server Architecture
1.1 Explain the purpose and function of server form factors
1
1.2 Given a scenario, install, configure and maintain server components
1
1.3 Compare and contrast power and cooling components
1
2.0 Server Administration
2.1 Install and configure server operating systems
2
2.2 Compare and contrast server roles and requirements for each
3
2.3 Given a scenario, use access and control methods to administer a server
2
2.4 Given a scenario, perform proper server maintenance techniques
3
2.5 Explain the importance of asset management and documentation
3
2.6 Explain the purpose and operation of virtualization components
2
3.0 Storage
3.1 Given a scenario, install and deploy primary storage devices based on given specifications and interfaces
4
3.2 Given a scenario, configure RAID using best practices
5
3.3 Summarize hardware and features of various storage technologies
4
3.4 Given a scenario, calculate appropriate storage capacity and plan for future growth
5
4.0 Security
4.1 Compare and contrast physical security methods and concepts
6
4.2 Given a scenario, apply server hardening techniques
6
4.3 Explain basic network security systems and protocols
7
4.4 Implement logical access control methods based on company policy
7
4.5 Implement data security methods and secure storage disposal techniques
7
4.6 Given a scenario, implement proper environmental controls and techniques
6
5.0 Networking
5.1 Given a scenario, configure servers to use IP addressing and network infrastructure services
8
5.2 Compare and contrast various ports and protocols
8
5.3 Given a scenario, install cables and implement proper cable management procedures
8
6.0 Disaster Recovery
6.1 Explain the importance of disaster recovery principles
9
6.2 Given a scenario, implement appropriate backup techniques
9
7.0 Troubleshooting
7.1 Explain troubleshooting theory and methodologies
10
7.2 Given a scenario, effectively troubleshoot hardware problems, selecting the appropriate tools and methods
10
7.3 Given a scenario, effectively troubleshoot software problems, selecting the appropriate tools and methods
10
7.4 Given a scenario, effectively diagnose network problems, selecting the appropriate tools and methods
11
7.5 Given a scenario, effectively troubleshoot storage problems, selecting the appropriate tools and methods
12
7.6 Given a scenario, effectively diagnose security issues, selecting the appropriate tools and methods
11
Exam specifications and content are subject to change at any time without prior notice and at CompTIA’s sole discretion. Please visit CompTIA’s website (www.comptia.org) for the most current information on the exam content.
Which of the following is not part of the form factor of a server?
SizeAppearanceDimensionsSecurityWhich function is made easier when a server has a rail kit?
InstallationMaintenanceConfigurationAccessingWhich of the following is the unit of measurement when discussing rack components?
MIUCWhich of the following is another term for RAID 1?
DuplicatingDoublingDuplexingMirroringWhat is the primary function of PXE?
Remote bootingSecure routingRemote administrationRedundant connectionsShares are used to allocate which of the following to VMs?
ROMCPUNVRAML2 cacheWhat is the most common protocol a SAN uses?
IPXIPEthernetFibre ChannelWhich of the following is true of a NAS?
A NAS has lower latency and higher reliability than a SAN.A NAS typically supports only RAID 5.A NAS does not support high throughput.Implementing a NAS is inexpensive.To which protocol is the term LUN related?
SCSIIPSSLFDDIWhat is the role of a DHCP server in a network?
Issues IP configurationsTranslates private to public addressesAuthenticates usersResolves IP addresses to hostnamesThe metric IOPS is used to describe the performance of which resource?
MemoryDiskCPUNetworkAs the number of users assigned to a printer increases, which resource should be increased?
DiskMetworkCPUMemoryWhat is the function of the command-line utility wevtutil?
Manages log filesManages network connectionsManages memory issuesManages CPU affinityWhich of the following is deleted when you execute Disk Cleanup?
Temp filesMemoryRouting tablesPagefileWhich RAID version requires at least three drives?
RAID 0RAID 1RAID 5RAID 10Which of the following statements is true with respect to safes?
No safes are fireproof.Consumer Reports assigns ratings to safes that you can use to assess the suitability of the safe.Those that are fire resistant will protect a backup tape from being damaged.When considering a safe, you should focus on two items: the cost and the size.Which of the following is true of an HIDS?
A high number of false negatives can cause a lax attitude on the part of the security team.An HIDS cannot address authentication issues.Encrypted packets can be analyzed.An HIDS monitors only traffic destined for the machine on which it is installed.The MBSA vulnerability scanner works on which operating system only?
LinuxWindowsUnixMacWhich of the following would Joe use to digitally sign a document so that Sally can verify his signature?
Joe’s private keySally’s private keyJoe’s public keySally’s public keyWhich authentication mechanism is an example of something you are?
PasswordUsernameSmartcardRetina scanWhat is a common host-based firewall on Linux-based systems?
iptablesnessustripwirescannowWhich of the following can be accomplished using port security?
Set the minimum number of MAC addresses that can be seen on a portSet the maximum number of IP addresses that can be seen on a portDefine exactly which MAC addresses are not allowed on the portSet the maximum number of MAC addresses that can be seen on a portWhen discussing 802.1x, which of the following roles is played by the user’s computer?
SupplicantAuthenticatorAuthentication serverImperativeWhich is the minimum category of cable required for 100 Mbps transmissions?
CAT3CAT5CAT5eCAT6Which of the following services uses port number 443?
SFTPNTPHTTPHTTPSWhat issue does the 802.1ax-2008 standard address?
NIC teamingDeterministic routingSecure DNSMIMOWhich of the following parts of a MAC address is unique for each interface made by a vendor?
UAABAAOUIEUI-64How many sets of backup tapes are used in the GFS system?
2345When creating a backup, what function can be used to verify the integrity of the results?
ChecksumsEncryptionDigital signaturesTransaction logsIf you perform a full backup once a week and use a differential backup scheme the rest of the week, how many tapes are required for a restore four days after the Full backup is taken?
1234Which of the following components is the one you most likely would measure with a multimeter?
NICHard drivePower supplyCPUWhat can be the result of high humidity?
CorrosionESDRFIEMIWhich of the following is not true about server backplanes?
They can be a single point of failure.They provide data and control signal connectors for CPU.Backplane failures are uncommon.You should implement redundant backplanes.Which of the following steps in the CompTIA troubleshooting method come first?
Verify full system functionality and, if applicable, implement preventive measures.Document findings, actions, and outcomes throughout the process.Identify the problem and determine the scope.Perform a root cause analysis.Which command is used on a Windows computer to identify the path taken to a destination network?
traceroutetracertipconfig/tracetraceOn which type of device is port security used?
HubSwitchRouterMultiplexerYou receive a destination unreachable message with a source IP address. Where is it coming from?
A remote routerA remote DNS serverA local DNS serverThe local routerThe sudo fdisk -l command lists the partitions on what type of system?
WindowsMacNovellLinuxIn Linux, what is fstab used for?
To mount partitions in bootTo create partitionsTo format a partitionTo defragment a driveWhat component locates the operating system in Linux?
NTLDRGRUBBootmgrboot.iniD. Form factor refers to the physical appearance and dimensions of the server.
B. Rail kits, when implemented, allow for the server to be slid out of the rack for maintenance.
C. Each U is 1.75 inches (4.445 cm) high.
D. RAID 1 is also known as disk mirroring. This is a method of producing fault tolerance by writing all data simultaneously to two separate drives.
A. The Preboot Execution Environment (PXE) is an industry standard client/server interface that allows networked computers that are not yet loaded with an operating system to be configured and booted remotely by an administrator.
B. There are three ways the allocation of the use of the physical CPU(s) can be controlled. These methods are as follows: