CompTIA Server+ Certification All-in-One Exam Guide, Second Edition (Exam SK0-005), 2nd Edition

Book description

This exam-focused study guide contains complete coverage of every topic on the current edition of the CompTIA Server+ certification exam

This highly effective self-study resource fully prepares you for the latest version of CompTIA’s Server+ certification exam. The book shows how to implement server-based hardware and software. In keeping with the All-in-One philosophy, this guide serves both as a study guide and as a valuable on-the-job reference.

Written by an IT expert and experienced author, CompTIA Server+ Certification All-in-One Exam Guide, Second Edition (Exam SK0-005) contains step-by-step exercises, special “Exam Watch” and “On the Job” sections, and “Two-Minute Drills” that reinforce and teach practical skills. Self-tests throughout contain accurate practice questions along with detailed explanations of both the correct and incorrect answer choices.
  • Contains 100% coverage of every objective for exam SK0-005
  • Online content includes hundreds of accurate practice questions
  • Includes a 10% off the exam voucher discount coupon—a $32 value

Table of contents

  1. Cover
  2. About the Author
  3. Title Page
  4. Copyright Page
  5. Contents at a Glance
  6. Contents
  7. Acknowledgments
  8. Introduction
  9. Chapter 1 Introduction to CompTIA Server+ Essentials
    1. Why This Book Is Relevant
    2. Server Hardware Basics
      1. Server Form Factors
      2. Server CPUs
      3. Server Memory
      4. Buses and Slots
      5. Virtualization
      6. Environmental Factors
    3. Storage
    4. Network Concepts
      1. Cables and Connectors
      2. IP
      3. Ports and Protocols
    5. Server Operating Systems and Server Roles
      1. Server Roles
      2. Maintenance
      3. Monitoring
    6. Security Considerations
      1. Hardening
      2. Network Security
    7. Troubleshooting and Optimizing Performance
      1. Optimizing Performance
      2. Troubleshooting
    8. Preparing for the Worst
    9. Cloud Computing
      1. Cloud Computing Characteristics
      2. Cloud Computing Deployment Models
      3. Cloud Computing Service Models
    10. Chapter Review
      1. Questions
      2. Questions and Answers
  10. Chapter 2 Server Hardware
    1. Server Form Factors
      1. Tower Servers
      2. Rack-mounted Equipment
      3. Blade Servers
    2. Server Components
      1. BIOS
      2. UEFI
      3. CPUs
      4. GPUs
      5. Memory
      6. Buses
      7. NICs
      8. Storage
      9. USB
    3. Power
      1. Voltage
      2. Wattage
      3. Uninterruptible Power Supply
    4. Environmental Controls
      1. Temperature
      2. Airflow
      3. Humidity
      4. Fire Suppression
    5. Hands-on Exercises
    6. Chapter Review
      1. Server Form Factors
      2. Server Components
      3. Power
      4. Environmental Controls
      5. Questions
      6. Questions and Answers
  11. Chapter 3 Server Operating Systems and Server Roles
    1. Server Roles
      1. Infrastructure Roles
      2. Other Server Roles
    2. Virtualization Servers
      1. Hypervisor Types
      2. Hypervisor Host Configuration
      3. Virtual Machine Guest Configuration
    3. Server Installation
      1. Server Licensing
      2. Installing a Type 1 Hypervisor
      3. Installing a Server Operating System
    4. Server Administration Methods
      1. KVM
      2. Out-of-Band Remote Administration
      3. In-Band Remote Administration
    5. Server Documentation
      1. Asset Life Cycle
      2. Asset Inventory
      3. Service Level Agreements
      4. Other Documentation
    6. Maintaining Servers
      1. Patch Management
      2. Proactive Maintenance
      3. Reactive Maintenance
    7. Hands-on Exercises
    8. Chapter Review
      1. Server Roles
      2. Virtualization Servers
      3. Server Installation
      4. Server Administration Methods
      5. Server Documentation
      6. Server Maintenance
      7. Questions
      8. Questions and Answers
  12. Chapter 4 Server Storage
    1. Storage Technologies
      1. Magnetic Hard Disks
      2. Solid-State Drives
      3. Hybrid Drives
      4. Storage Tiers
      5. Disk Interfaces
      6. Optical Drives
      7. Cloud Storage
      8. Direct-Attached Storage
      9. Network-Attached Storage
      10. Storage Area Networks
    2. Storage Capacity and Future Growth
      1. Base 2 vs. Base 10
      2. Where Did All the Disk Space Go?
      3. Using Less Disk Space
    3. RAID Configuration
      1. RAID Levels
    4. Storage Device Installation
      1. MBR and GPT
      2. File Systems
      3. Sample Scenario 1
      4. Sample Scenario 2
    5. Hands-on Exercises
    6. Chapter Review
      1. Storage Device Characteristics
      2. Disk Interfaces
      3. Local and Network Storage
      4. Storage Capacity Planning
      5. RAID
      6. Disk Initialization and File Systems
      7. Questions
      8. Questions and Answers
  13. Chapter 5 Server Network Communications
    1. The OSI Model
    2. Cable Installation and Management
      1. Cable Placement
      2. Cable Labeling
      3. Cable Types
    3. Network Hardware
      1. Network Interface Cards
      2. Network Switches
      3. Routers
    4. Configuring IPv4
      1. PAT
      2. Static NAT
      3. IP
      4. IPv4 Addressing
      5. Subnet Mask
      6. Reserved Internal IP Address Ranges
      7. When to Use Subnetting
    5. Configuring IPv6
      1. IPv6 Addressing
      2. IPv6 Settings
      3. IPv6 Transition Technologies
    6. Network Infrastructure Services
      1. Default Gateway
      2. DNS Servers
      3. WINS Servers
      4. DHCP
    7. TCP and UDP
      1. TCP
      2. UDP
    8. Hands-on Exercises
    9. Chapter Review
      1. The OSI Model
      2. Cables and Connectors
      3. Network Interface Cards
      4. IPv4 and IPv6
      5. IP, TCP, and UDP
      6. Questions
      7. Questions and Answers
  14. Chapter 6 Server and Network Security
    1. Physical Security Measures
      1. Premises Access
      2. The Human Element
      3. Authentication
      4. Under Lock and Key
    2. Logical Access Control
      1. Groups
      2. Dynamic Access Control
      3. Roles
      4. Rights and Permissions
      5. File System Permissions
      6. Peripheral Devices
    3. Network Security
      1. NAC
      2. VLANs
      3. Firewalls
      4. Security Zones
      5. PKI
      6. IPSec
      7. VPNs
      8. Intrusion Detection and Prevention Systems
    4. Hardening
      1. Operating System Hardening
      2. Hardware Hardening
      3. Application Hardening
    5. Data Security
      1. Data and Mobile Devices
      2. Encrypting Data at Rest
      3. Tape Encryption
      4. Secure Media Disposal
    6. Hands-on Exercises
    7. Chapter Review
      1. Physical Security
      2. Authentication
      3. Logical Access Control
      4. Network Security
      5. Firewalls
      6. PKI
      7. IPSec
      8. VPNs
      9. Intrusion Detection and Prevention
      10. Hardening
      11. Data Security
      12. Secure Media Disposal
      13. Questions
      14. Questions and Answers
  15. Chapter 7 Troubleshooting and Performance Optimization
    1. Troubleshooting Methodology
      1. Identify the Problem
      2. Establish a Theory of Probable Cause
      3. Test the Theory
      4. Establish a Plan of Action
      5. Implement a Solution or Escalate
      6. Verify Functionality
      7. Perform Root Cause Analysis
      8. Document the Solution
    2. Hardware Problems and Solutions
    3. Software Problems and Solutions
    4. Storage Problems and Solutions
      1. Windows Tools
      2. Linux Tools
    5. Network Problems and Solutions
      1. Name Resolution Issues
    6. Security Problems and Solutions
      1. Malware Troubleshooting
      2. Too Few Permissions
      3. Too Many Permissions
      4. Too Much Running
      5. Confidentiality and Integrity
    7. Performance Optimization
      1. Hardware Optimization
      2. Software Optimization
      3. Network Optimization
    8. Hands-on Exercises
    9. Chapter Review
      1. Troubleshooting Methodology
      2. Hardware Problems and Solutions
      3. Software Problems and Solutions
      4. Storage Problems and Solutions
      5. Network Problems and Solutions
      6. Security Problems and Solutions
      7. Performance Optimization
      8. Questions
      9. Questions and Answers
  16. Chapter 8 Disaster Recovery Planning
    1. Disaster Recovery
      1. Alternate Sites
      2. Data Replication
      3. Business Impact Analysis
    2. Business Continuity
      1. Disaster Recovery Plan
      2. Business Continuity Plan
    3. Data Backup
      1. Backup Types
      2. Backup Media
      3. On-premises Backup
      4. Cloud Backup
      5. Backup and Restore Best Practices
    4. Hands-on Exercises
    5. Chapter Review
      1. Disaster Recovery Sites
      2. Data Replication
      3. Business Impact
      4. Disaster Recovery Plan
      5. Business Continuity Plan
      6. Data Backups
      7. Questions
      8. Questions and Answers
  17. Appendix A About the Hands-on Exercises and Lab Setup
    1. Lab Exercise Overview
    2. Microsoft Windows
    3. Linux
    4. Requirements for Hands-on Exercises
      1. Hardware Requirements
      2. VMware Workstation 16 Pro
      3. Acquiring Windows and Linux Installation Media
    5. Lab Exercise Miscellany
  18. Appendix B Objective Map
    1. Exam SK0-005
      1. CompTIA Server+ Certification Exam SK0-005
  19. Appendix C About the Online Content
    1. System Requirements
    2. Your Total Seminars Training Hub Account
      1. Privacy Notice
    3. Single User License Terms and Conditions
    4. TotalTester Online
      1. Performance-Based Questions
    5. Technical Support
  20. Glossary
  21. Index

Product information

  • Title: CompTIA Server+ Certification All-in-One Exam Guide, Second Edition (Exam SK0-005), 2nd Edition
  • Author(s): Daniel Lachance
  • Release date: August 2021
  • Publisher(s): McGraw-Hill
  • ISBN: 9781260469929