You are previewing CompTIA Server+ Certification All-in-One Exam Guide (Exam SK0-004) (PPK).
O'Reilly logo
CompTIA Server+ Certification All-in-One Exam Guide (Exam SK0-004) (PPK)

Book Description

Complete coverage of every objective for the CompTIA Server+ exam

Take the CompTIA Server+ exam with confidence using this highly effective self-study guide. CompTIA Server+ Certification All-in-One Exam Guide (Exam SK0-004) offers complete coverage of every topic on the latest version of the exam. You will get in-depth explanations of the latest server types and components, virtualization, IPv4 and IPv6 networking, cloud computing, security, troubleshooting, and more. The book and electronic content provide 350+ accurate practice questions along with in-depth answers, explanations, learning objectives, and exam tips.

Coverage includes:

• General concepts
• CompTIA Server+ essentials
• Server hardware
• Server operating systems
• Storage
• Network concepts
• Security
• Troubleshooting
• Performance optimization


CD ICON

Electronic content includes:

• Practice exam questions
• Secured book PDF

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Contents
  5. Preface
  6. Acknowledgments
  7. Introduction
  8. Chapter 1 Introduction to CompTIA Server+ Essentials
    1. Why This Book Is Relevant
    2. Server Hardware Basics
      1. Server Form Factors
      2. Server CPUs
      3. Server Memory
      4. Buses and Slots
      5. Virtualization
      6. Environmental Factors
    3. Storage
    4. Network Concepts
      1. Cables and Connectors
      2. IP
      3. Ports and Protocols
    5. Server Operating Systems
      1. Server Roles
      2. Maintenance
      3. Monitoring
    6. Security Considerations
      1. Hardening
      2. Network Security
    7. Troubleshooting and Optimizing Performance
      1. Optimizing Performance
      2. Troubleshooting
    8. Preparing for the Worst
    9. Chapter Review
      1. Questions
      2. Questions and Answers
  9. Chapter 2 Server Hardware
    1. Server Form Factors
      1. Tower Servers
      2. Rack-mounted Equipment
      3. Blade Servers
    2. Server Components
      1. BIOS
      2. UEFI
      3. CPUs
      4. Memory
      5. Buses
      6. NICs
      7. Storage
      8. USB
    3. Power
      1. Voltage
      2. Wattage
      3. UPS
    4. Environmental Controls
      1. Temperature
      2. Air Flow
      3. Humidity
      4. Fire Suppression
    5. Hands-on Exercises
      1. Exercise 2-1: Calculate Rack Space
      2. Exercise 2-2: Create a Windows Server 2012 R2 Virtual Machine Configuration
      3. Exercise 2-3: Create a Red Hat Enterprise Linux 7 Virtual Machine Configuration
    6. Chapter Review
      1. Server Form Factors
      2. Server Components
      3. Power
      4. Environmental Controls
      5. Questions
      6. Questions and Answers
  10. Chapter 3 Server Operating Systems
    1. Server Roles
      1. Infrastructure Roles
      2. Other Server Roles
    2. Virtualization Servers
      1. Hypervisor Types
      2. Hypervisor Host Configuration
      3. Virtual Machine Guest Configuration
    3. Server Installation
      1. Installing a Type 1 Hypervisor
      2. Installing a Server Operating System
    4. Server Administration Methods
      1. KVM
      2. Out-of-band Remote Administration
      3. In-band Remote Administration
    5. Server Documentation
      1. Asset Life Cycle
      2. Asset Inventory
      3. Service Level Agreements
      4. Other Documentation
    6. Maintaining Servers
      1. Patch Management
      2. Proactive Maintenance
      3. Reactive Maintenance
    7. Hands-on Exercises
      1. Exercise 3-1: Install the Microsoft Windows Server 2012 R2 Operating System
      2. Exercise 3-2: Install the DNS Server Role in Windows Server 2012 R2
      3. Exercise 3-3: Configure the DNS Server in Windows Server 2012 R2
      4. Exercise 3-4: Install the DHCP Server in Windows Server 2012 R2
      5. Exercise 3-5: Install an Active Directory Server in Windows Server 2012 R2
      6. Exercise 3-6: Install the Red Hat Enterprise Linux 7 Operating System
      7. Exercise 3-7: Configure Windows Server 2012 R2 to Use Internet NTP Time
    8. Chapter Review
      1. Server Roles
      2. Virtualization Servers
      3. Server Installation
      4. Server Administration Methods
      5. Server Documentation
      6. Server Maintenance
      7. Questions
      8. Questions and Answers
  11. Chapter 4 Storage
    1. Storage Technologies
      1. Magnetic Hard Disks
      2. Solid-State Drives
      3. Hybrid Drives
      4. Storage Tiers
      5. Disk Interfaces
      6. Optical Drives
      7. Cloud Storage
      8. Direct-Attached Storage
      9. Network-Attached Storage
      10. Storage Area Networks
    2. Storage Capacity and Future Growth
      1. Base 2 vs. Base 10
      2. Where Did All the Disk Space Go?
      3. Using Less Disk Space
    3. RAID Configuration
      1. RAID Levels
    4. Storage Device Installation
      1. MBR and GPT
      2. File Systems
      3. Sample Scenario 1
      4. Sample Scenario 2
    5. Hands-on Exercises
      1. Exercise 4-1: Configure a Windows Server 2012 R2 iSCSI Target
      2. Exercise 4-2: Use the Red Hat Enterprise Linux 7 iSCSI Initiator to Connect to an iSCSI Target
      3. Exercise 4-3: Configure Software RAID Using Windows Server 2012 R2
      4. Exercise 4-4: Configure Software RAID Using Red Hat Enterprise Linux 7
      5. Exercise 4-5: Monitor Disk Space Using File Server Resource Manager
      6. Exercise 4-6: Set a Disk Quota Using File Server Resource Manager
      7. Exercise 4-7: Retrieve Disk Information Using PowerShell
    6. Chapter Review
      1. Storage Device Characteristics
      2. Disk Interfaces
      3. Local and Network Storage
      4. Storage Capacity Planning
      5. RAID
      6. Disk Initialization and File Systems
      7. Questions
      8. Questions and Answers
  12. Chapter 5 Network Concepts
    1. The OSI Model
    2. Cable Installation and Management
      1. Cable Placement
      2. Cable Labeling
      3. Cable Types
    3. Network Hardware
      1. Network Interface Cards
      2. Network Switches
      3. Routers
    4. Configuring IPv4
      1. PAT
      2. NAT
      3. IP
      4. IPv4 Addressing
      5. Subnet Mask
      6. Reserved Internal IP Address Ranges
      7. When to Use Subnetting
    5. Configuring IPv6
      1. IPv6 Addressing
      2. IPv6 Settings
      3. IPv6 Transition Technologies
    6. Network Infrastructure Services
      1. Default Gateway
      2. DNS Servers
      3. WINS Servers
      4. DHCP
    7. TCP and UDP
      1. TCP
      2. UDP
    8. Hands-on Exercises
      1. Exercise 5-1: Manually Configure IPv6 on Windows Server 2012 R2
      2. Exercise 5-2: Manually Configure IPv6 on Red Hat Enterprise Linux 7
      3. Exercise 5-3: Install and Configure NAT on Windows Server 2012 R2
      4. Exercise 5-4: Use Wireshark to Capture and Analyze HTTP Traffic
    9. Chapter Review
      1. The OSI Model
      2. Cables and Connectors
      3. Network Interface Cards
      4. IPv4 and IPv6
      5. IP, TCP, and UDP
      6. Questions
      7. Questions and Answers
  13. Chapter 6 Security
    1. Physical Security
      1. Premises Access
      2. The Human Element
      3. Authentication
      4. Under Lock and Key
    2. Logical Access Control
      1. Groups
      2. Dynamic Access Control
      3. Roles
      4. Rights and Permissions
      5. File System Permissions
      6. Peripheral Devices
    3. Network Security
      1. NAC
      2. VLANs
      3. Firewalls
      4. Security Zones
      5. PKI
      6. IPSec
      7. VPNs
      8. Intrusion Detection and Prevention Systems
    4. Hardening
      1. Operating System Hardening
      2. Hardware Hardening
      3. Application Hardening
    5. Data Security
      1. Data and Mobile Devices
      2. Encrypting Data at Rest
      3. Tape Encryption
      4. Secure Media Disposal
    6. Hands-on Exercises
      1. Exercise 6-1: Set NTFS File System Permissions
      2. Exercise 6-2: Set Shared Folder Permissions
      3. Exercise 6-3: Set File System Permissions in Linux
      4. Exercise 6-4: Use EFS to Encrypt Files in Windows
      5. Exercise 6-5: Use OpenSSL to Encrypt Files in Linux
      6. Exercise 6-6: Use iptables to Set Firewall Rules in Linux
      7. Exercise 6-7: Enable Encrypted Communication on a Windows IIS Web Server
    7. Chapter Review
      1. Physical Security
      2. Authentication
      3. Logical Access Control
      4. Network Security
      5. Firewalls
      6. PKI
      7. IPSec
      8. VPNs
      9. Intrusion Detection and Prevention
      10. Hardening
      11. Data Security
      12. Secure Media Disposal
      13. Questions
      14. Questions and Answers
  14. Chapter 7 Troubleshooting and Performance Optimization
    1. Troubleshooting Methodology
      1. Identify the Problem
      2. Establish a Theory of Probable Cause
      3. Test the Theory
      4. Establish a Plan of Action
      5. Implement a Solution or Escalate
      6. Verify Functionality
      7. Perform Root Cause Analysis
      8. Document the Solution
    2. Hardware Problems and Solutions
    3. Software Problems and Solutions
    4. Storage Problems and Solutions
      1. Windows Tools
      2. Linux Tools
    5. Network Problems and Solutions
      1. Name Resolution Issues
    6. Security Problems and Solutions
      1. Malware Troubleshooting
      2. Too Few Permissions
      3. Too Many Permissions
      4. Too Much Running
      5. Confidentiality and Integrity
    7. Performance Optimization
      1. Hardware Optimization
      2. Software Optimization
      3. Network Optimization
    8. Hands-on Exercises
      1. Exercise 7-1: Explore Windows Performance Monitoring Tools
      2. Exercise 7-2: Explore Linux Performance Monitoring Tools
      3. Exercise 7-3: Use Windows PowerShell to Retrieve Event Log Information
      4. Exercise 7-4: View Linux Log File Entries
    9. Chapter Review
      1. Troubleshooting Methodology
      2. Hardware Problems and Solutions
      3. Software Problems and Solutions
      4. Storage Problems and Solutions
      5. Network Problems and Solutions
      6. Security Problems and Solutions
      7. Performance Optimization
      8. Questions
      9. Questions and Answers
  15. Chapter 8 Preparing for the Worst
    1. Disaster Recovery
      1. Alternate Sites
      2. Data Replication
      3. Business Impact Analysis
    2. Business Continuity
      1. Disaster Recovery Plan
      2. Business Continuity Plan
    3. Data Backup
      1. Backup Types
      2. Backup Media
      3. On-premises Backup
      4. Cloud Backup
      5. Backup and Restore Best Practices
    4. Hands-on Exercises
      1. Exercise 8-1: Configure the Volume Shadow Service on Windows Server 2012 R2
      2. Exercise 8-2: Restore Previous Versions of Files in Windows
      3. Exercise 8-3: Configure and Use Windows Server Backup
      4. Exercise 8-4: Use the Linux tar Command for Data Backup
    5. Chapter Review
      1. Disaster Recovery Sites
      2. Data Replication
      3. Business Impact
      4. Disaster Recovery Plan
      5. Business Continuity Plan
      6. Data Backups
      7. Questions
      8. Questions and Answers
  16. Appendix A About the Hands-on Exercises and Lab Set-up
    1. Lab Exercise Overview
    2. Windows
    3. Linux
    4. Requirements for Hands-on Exercises
      1. Hardware Requirements
      2. VMware Workstation 10
      3. Install VMware Workstation 10
      4. Acquiring Windows and Linux Installation Media
    5. Lab Exercise Miscellany
  17. Appendix B URL Reference
  18. Appendix C Real-World Best Practices
    1. Server Installation
    2. Virtualization
    3. Cloud Computing
    4. Storage
    5. Networks
    6. Security
  19. Appendix D CompTIA Server+ Certification Exam Objectives (SK0-004)
    1. 1.0 Server Architecture
      1. 1.1 Explain the purpose and function of server form factors
      2. 1.2 Given a scenario, install, configure and maintain server components
      3. 1.3 Compare and contrast power and cooling components
    2. 2.0 Server Administration
      1. 2.1 Install and configure server operating systems
      2. 2.2 Compare and contrast server roles and requirements for each
      3. 2.3 Given a scenario, use access and control methods to administer a server
      4. 2.4 Given a scenario, perform proper server maintenance techniques
      5. 2.5 Explain the importance of asset management and documentation
      6. 2.6 Explain the purpose and operation of virtualization components
    3. 3.0 Storage
      1. 3.1 Given a scenario, install and deploy primary storage devices based on given specifications and interfaces
      2. 3.2 Given a scenario, configure RAID using best practices
      3. 3.3 Summarize hardware and features of various storage technologies
      4. 3.4 Given a scenario, calculate appropriate storage capacity and plan for future growth
    4. 4.0 Security
      1. 4.1 Compare and contrast physical security methods and concepts
      2. 4.2 Given a scenario, apply server hardening techniques
      3. 4.3 Explain basic network security systems and protocols
      4. 4.4 Implement logical access control methods based on company policy
      5. 4.5 Implement data security methods and secure storage disposal techniques
      6. 4.6 Given a scenario, implement proper environmental controls and techniques
    5. 5.0 Networking
      1. 5.1 Given a scenario, configure servers to use IP addressing and network infrastructure services
      2. 5.2 Compare and contrast various ports and protocols
      3. 5.3 Given a scenario, install cables and implement proper cable management procedures
    6. 6.0 Disaster Recovery
      1. 6.1 Explain the importance of disaster recovery principles
      2. 6.2 Given a scenario, implement appropriate backup techniques
    7. 7.0 Troubleshooting
      1. 7.1 Explain troubleshooting theory and methodologies
      2. 7.2 Given a scenario, effectively troubleshoot hardware problems, selecting the appropriate tools and methods
      3. 7.3 Given a scenario, effectively troubleshoot software problems, selecting the appropriate tools and methods
      4. 7.4 Given a scenario, effectively diagnose network problems, selecting the appropriate tools and methods
      5. 7.5 Given a scenario, effectively troubleshoot storage problems, selecting the appropriate tools and methods
      6. 7.6 Given a scenario, effectively diagnose security issues, selecting the appropriate tools and methods
  20. Appendix E About the Download
    1. System Requirements
    2. Downloading Total Tester Premium Practice Exam Software
    3. Total Tester Premium Practice Exam Software
    4. Installing and Running Total Tester
    5. Technical Support
  21. Glossary
  22. Index