0%

This exam-focused study guide contains complete coverage of every topic on the current edition of the CompTIA Server+ certification exam

This highly effective self-study resource fully prepares you for the latest version of CompTIA’s Server+ certification exam. The book shows how to implement server-based hardware and software. In keeping with the All-in-One philosophy, this guide serves both as a study guide and as a valuable on-the-job reference.

Written by an IT expert and experienced author, CompTIA Server+ Certification All-in-One Exam Guide, Second Edition (Exam SK0-005) contains step-by-step exercises, special “Exam Watch” and “On the Job” sections, and “Two-Minute Drills” that reinforce and teach practical skills. Self-tests throughout contain accurate practice questions along with detailed explanations of both the correct and incorrect answer choices.

  • Contains 100% coverage of every objective for exam SK0-005
  • Online content includes hundreds of accurate practice questions
  • Includes a 10% off the exam voucher discount coupon—a $32 value

Table of Contents

  1. Cover
  2. About the Author
  3. Title Page
  4. Copyright Page
  5. Contents at a Glance
  6. Contents
  7. Acknowledgments
  8. Introduction
  9. Chapter 1 Introduction to CompTIA Server+ Essentials
    1. Why This Book Is Relevant
    2. Server Hardware Basics
    3. Server Form Factors
    4. Server CPUs
    5. Server Memory
    6. Buses and Slots
    7. Virtualization
    8. Environmental Factors
    9. Storage
    10. Network Concepts
    11. Cables and Connectors
    12. IP
    13. Ports and Protocols
    14. Server Operating Systems and Server Roles
    15. Server Roles
    16. Maintenance
    17. Monitoring
    18. Security Considerations
    19. Hardening
    20. Network Security
    21. Troubleshooting and Optimizing Performance
    22. Optimizing Performance
    23. Troubleshooting
    24. Preparing for the Worst
    25. Cloud Computing
    26. Cloud Computing Characteristics
    27. Cloud Computing Deployment Models
    28. Cloud Computing Service Models
    29. Chapter Review
    30. Questions
    31. Questions and Answers
  10. Chapter 2 Server Hardware
    1. Server Form Factors
    2. Tower Servers
    3. Rack-mounted Equipment
    4. Blade Servers
    5. Server Components
    6. BIOS
    7. UEFI
    8. CPUs
    9. GPUs
    10. Memory
    11. Buses
    12. NICs
    13. Storage
    14. USB
    15. Power
    16. Voltage
    17. Wattage
    18. Uninterruptible Power Supply
    19. Environmental Controls
    20. Temperature
    21. Airflow
    22. Humidity
    23. Fire Suppression
    24. Hands-on Exercises
    25. Chapter Review
    26. Server Form Factors
    27. Server Components
    28. Power
    29. Environmental Controls
    30. Questions
    31. Questions and Answers
  11. Chapter 3 Server Operating Systems and Server Roles
    1. Server Roles
    2. Infrastructure Roles
    3. Other Server Roles
    4. Virtualization Servers
    5. Hypervisor Types
    6. Hypervisor Host Configuration
    7. Virtual Machine Guest Configuration
    8. Server Installation
    9. Server Licensing
    10. Installing a Type 1 Hypervisor
    11. Installing a Server Operating System
    12. Server Administration Methods
    13. KVM
    14. Out-of-Band Remote Administration
    15. In-Band Remote Administration
    16. Server Documentation
    17. Asset Life Cycle
    18. Asset Inventory
    19. Service Level Agreements
    20. Other Documentation
    21. Maintaining Servers
    22. Patch Management
    23. Proactive Maintenance
    24. Reactive Maintenance
    25. Hands-on Exercises
    26. Chapter Review
    27. Server Roles
    28. Virtualization Servers
    29. Server Installation
    30. Server Administration Methods
    31. Server Documentation
    32. Server Maintenance
    33. Questions
    34. Questions and Answers
  12. Chapter 4 Server Storage
    1. Storage Technologies
    2. Magnetic Hard Disks
    3. Solid-State Drives
    4. Hybrid Drives
    5. Storage Tiers
    6. Disk Interfaces
    7. Optical Drives
    8. Cloud Storage
    9. Direct-Attached Storage
    10. Network-Attached Storage
    11. Storage Area Networks
    12. Storage Capacity and Future Growth
    13. Base 2 vs. Base 10
    14. Where Did All the Disk Space Go?
    15. Using Less Disk Space
    16. RAID Configuration
    17. RAID Levels
    18. Storage Device Installation
    19. MBR and GPT
    20. File Systems
    21. Sample Scenario 1
    22. Sample Scenario 2
    23. Hands-on Exercises
    24. Chapter Review
    25. Storage Device Characteristics
    26. Disk Interfaces
    27. Local and Network Storage
    28. Storage Capacity Planning
    29. RAID
    30. Disk Initialization and File Systems
    31. Questions
    32. Questions and Answers
  13. Chapter 5 Server Network Communications
    1. The OSI Model
    2. Cable Installation and Management
    3. Cable Placement
    4. Cable Labeling
    5. Cable Types
    6. Network Hardware
    7. Network Interface Cards
    8. Network Switches
    9. Routers
    10. Configuring IPv4
    11. PAT
    12. Static NAT
    13. IP
    14. IPv4 Addressing
    15. Subnet Mask
    16. Reserved Internal IP Address Ranges
    17. When to Use Subnetting
    18. Configuring IPv6
    19. IPv6 Addressing
    20. IPv6 Settings
    21. IPv6 Transition Technologies
    22. Network Infrastructure Services
    23. Default Gateway
    24. DNS Servers
    25. WINS Servers
    26. DHCP
    27. TCP and UDP
    28. TCP
    29. UDP
    30. Hands-on Exercises
    31. Chapter Review
    32. The OSI Model
    33. Cables and Connectors
    34. Network Interface Cards
    35. IPv4 and IPv6
    36. IP, TCP, and UDP
    37. Questions
    38. Questions and Answers
  14. Chapter 6 Server and Network Security
    1. Physical Security Measures
    2. Premises Access
    3. The Human Element
    4. Authentication
    5. Under Lock and Key
    6. Logical Access Control
    7. Groups
    8. Dynamic Access Control
    9. Roles
    10. Rights and Permissions
    11. File System Permissions
    12. Peripheral Devices
    13. Network Security
    14. NAC
    15. VLANs
    16. Firewalls
    17. Security Zones
    18. PKI
    19. IPSec
    20. VPNs
    21. Intrusion Detection and Prevention Systems
    22. Hardening
    23. Operating System Hardening
    24. Hardware Hardening
    25. Application Hardening
    26. Data Security
    27. Data and Mobile Devices
    28. Encrypting Data at Rest
    29. Tape Encryption
    30. Secure Media Disposal
    31. Hands-on Exercises
    32. Chapter Review
    33. Physical Security
    34. Authentication
    35. Logical Access Control
    36. Network Security
    37. Firewalls
    38. PKI
    39. IPSec
    40. VPNs
    41. Intrusion Detection and Prevention
    42. Hardening
    43. Data Security
    44. Secure Media Disposal
    45. Questions
    46. Questions and Answers
  15. Chapter 7 Troubleshooting and Performance Optimization
    1. Troubleshooting Methodology
    2. Identify the Problem
    3. Establish a Theory of Probable Cause
    4. Test the Theory
    5. Establish a Plan of Action
    6. Implement a Solution or Escalate
    7. Verify Functionality
    8. Perform Root Cause Analysis
    9. Document the Solution
    10. Hardware Problems and Solutions
    11. Software Problems and Solutions
    12. Storage Problems and Solutions
    13. Windows Tools
    14. Linux Tools
    15. Network Problems and Solutions
    16. Name Resolution Issues
    17. Security Problems and Solutions
    18. Malware Troubleshooting
    19. Too Few Permissions
    20. Too Many Permissions
    21. Too Much Running
    22. Confidentiality and Integrity
    23. Performance Optimization
    24. Hardware Optimization
    25. Software Optimization
    26. Network Optimization
    27. Hands-on Exercises
    28. Chapter Review
    29. Troubleshooting Methodology
    30. Hardware Problems and Solutions
    31. Software Problems and Solutions
    32. Storage Problems and Solutions
    33. Network Problems and Solutions
    34. Security Problems and Solutions
    35. Performance Optimization
    36. Questions
    37. Questions and Answers
  16. Chapter 8 Disaster Recovery Planning
    1. Disaster Recovery
    2. Alternate Sites
    3. Data Replication
    4. Business Impact Analysis
    5. Business Continuity
    6. Disaster Recovery Plan
    7. Business Continuity Plan
    8. Data Backup
    9. Backup Types
    10. Backup Media
    11. On-premises Backup
    12. Cloud Backup
    13. Backup and Restore Best Practices
    14. Hands-on Exercises
    15. Chapter Review
    16. Disaster Recovery Sites
    17. Data Replication
    18. Business Impact
    19. Disaster Recovery Plan
    20. Business Continuity Plan
    21. Data Backups
    22. Questions
    23. Questions and Answers
  17. Appendix A About the Hands-on Exercises and Lab Setup
    1. Lab Exercise Overview
    2. Microsoft Windows
    3. Linux
    4. Requirements for Hands-on Exercises
    5. Hardware Requirements
    6. VMware Workstation 16 Pro
    7. Acquiring Windows and Linux Installation Media
    8. Lab Exercise Miscellany
  18. Appendix B Objective Map
    1. Exam SK0-005
    2. CompTIA Server+ Certification Exam SK0-005
  19. Appendix C About the Online Content
    1. System Requirements
    2. Your Total Seminars Training Hub Account
    3. Privacy Notice
    4. Single User License Terms and Conditions
    5. TotalTester Online
    6. Performance-Based Questions
    7. Technical Support
  20. Glossary
  21. Index
18.218.38.125