Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Title Page Copyright and Credits
CompTIA Server+ Certification Guide
About Packt
Why subscribe? Packt.com
Contributors
About the author About the reviewer Packt is searching for authors like you
Preface
Who this book is for What this book covers To get the most out of this book
Download the color images Conventions used
Get in touch
Reviews
Section 1: System Architecture Server Hardware
Server roles
Application servers Database servers Directory servers File servers Mail servers Messaging servers Network services servers Print servers Proxy server Routing and Remote Access Service (RRAS) Virtual server
Form factors
Tower servers Rack mounts Blade technology
Server power systems
Electrical power
AC versus DC / 110V versus 230V
Wye and delta
Negative 48V One phase versus three phases
PSU Wattage The 80-plus certification Selecting the right PSU Redundancy
System heat
Cooling systems
Air cooling and air flow
Summary Questions
Server Internals
CPUs
Multiprocessors Symmetrical Multiprocessing (SMP) versus Asymmetrical Multiprocessing (ASMP) SIMD, MISD, and MIMD Multiple core processing CPU packages and sockets Cache memory CPU cache memory CPU cache memory levels Write-back/write-through cache Advanced RISC Machine (ARM) servers CPU multiplier CPU stepping
Main memory
RAM
Double Data Rate (DDR) RAM RAM packaging
Memory timing Error-correction code (ECC) versus non-ECC Dual channel memory Color-coded RAM slots
Buses, channels, and expansion slots
Bus width Peripheral Component Interconnect (PCI) bus
PCI size and fit standards PCI conventional PCI-e
Expansion cards
Network interface controller (NIC) Host Bus Adapter (HBA) Redundant Array of Independent Disks (RAID) controller Riser cards
USB interface and port
Configuration
BIOS UEFI
Summary Questions
Data Storage
Data storage devices and their specifications
Hard drive specifications
Form factors
Small form factor (SFF) Large form factor (LFF)
HDD specification and configuration Disk capacity – decimal versus binary Hard disk drive (HDD) versus solid-state drive (SSD) SSD specification and configuration
Hard disk interfaces Data storage systems
Direct-attached storage (DAS) Network-attached storage (NAS) Storage area network (SAN)
SAN fabric SAN communications Logical Unit Number (LUN) zoning and masking
Filesystem
Operating systems and filesystems File sharing
RAID
Striping and mirroring RAID levels RAID implementation Disk quotas Disk compression High availability (HA)
The nines
Fault tolerance Replacing failed components
Disk storage capacity planning
Other storage devices
Magnetic tape Optical storage
Summary Questions
Server Operating Systems
The network server
Server functions Network server operating systems Operating system (OS) functions
User/computer communications Memory management
Dynamic loading and linking Memory allocation
Control and coordination of hardware
The use of system resources
Internal and network file management User, data, application, and resource security
Hardware configuration
The primary parts of an OS The OS and hardware
Boot sequence
Firmware Preparing a disk for the OS
Filesystems
Formatting Filesystems by OS Journaling Special function filesystems
Network configuration
Configuring the hostname
Configuring a hostname on Windows Server Configuring a hostname on a Linux server
User accounts
Creating a local user account Creating a domain user account
Adding a workstation to a domain Connecting to a network
Connecting a PC to a network Adding server roles and features
Unattended and remote installations
NOS optimization Summary Questions
Addressing
IP addressing
IP version 4
The IPv4 address structure Classful IP addressing LAN addressing
Private IP addresses Network and host IDs Network Address Translation (NAT)
Collision domains Broadcast domains Classless Interdomain Routing (CIDR)
Subnetting
Subnets and hosts Subnet masks Network and broadcast addresses
Internet Protocol version 6 (IPv6)
The IPv6 address structure
Reserved prefixes IPv6 address compression IPv6 leading zero compression
IPv6 network ID Address categories
MAC addressing Address resolution
ARP DNS
DNS search Domain suffix
The Windows Internet Name Service (WINS)
Ports and protocols
Well-known ports Registered ports
Summary Questions
Cabling
Copper cabling
Twisted-pair cabling Coaxial cabling Network connectors EIA/TIA 568 facility standards Category cabling Ethernet cable standards
Fiber-optic cabling
Fiber-optic cable modes
SM fiber-optic cable MM fiber-optic cable
Fiber-optic cable connectors
Network cable installation Summary Questions
Section 2: Administration Server Administration
Hardware administration
Network administration
Configuring, updating, and maintaining network hardware
KVM interfaces Serial interfaces
Network-based hardware administration Network-based operating system administration
Asset management
Information Technology Asset Management (ITAM) IT life cycle asset management Additional ITAM terms
System documentation
Service manuals System and network documentation System diagrams System documentation Other documents and documentation Storing sensitive documentation
Summary Questions
Server Maintenance
Change and patch management
Change control process Patch management OS updates Device driver updates Firmware updates
Hardware maintenance
Server monitoring systems Light Emitting Diodes (LED) server status indicator
Liquid Crystal Display (LCD) messages Beep codes
Replace failed components
Preventive maintenance
Fault tolerance and high availability
Clustering Active/active versus active/passive clusters Load balancing Heartbeat Hot and not hot
Hot swap Non-hot swap Service level agreements (SLA)
Summary Questions
Virtualization
Virtual networking
Virtual network components Virtual devices Virtual servers Hypervisors Hosts and guests Virtual machine (VM)
Hardware configuration for a virtual environment
Virtual resource allocation Network connectivity Virtual internetworking devices
Summary Questions
Disaster Recovery
Business continuity plan (BCP)
BIA Risk assessment Continuity of operations
DRP
Recovery plans Recovery sites
Replication and backup
Data replication
Synchronous and asynchronous Replication methods
Data backup
Archive bit Backup methods Data versus OS restore
Backup media Media storage Backup media integrity Backup media retention
Summary Questions
Section 3: Security Security Systems and Protocols
Security zones
Firewall zones Demilitarized zone (DMZ) Browser zones
Security devices
Authentication protocols
Authentication methods Point-to-point authentication protocols AAA authentication protocols Secure Sockets Layer (SSL)/Transport Layer Security (TLS) Internet Protocol Security (IPSec) IPSec policies IPSec modes
Port security
Port-based security IEEE 802.1x Access control list (ACL)
Router ACLs Access list content
ACL types
Standard ACLs Extended ACLs Other ACL types ACE types
Wildcard masks
Public key infrastructure (PKI)
PKI features Encryption and authentication Virtual private network (VPN) Virtual LAN (VLAN)
Summary Questions
Physical Security and Environmental Controls
MFA
Passwords Authentication factors
General physical security concepts
Threats to physical security
Environmental threats Man-made threats Site-specific threats Technical threats
Physical security devices
Environmental controls
Environmental monitoring Electrical power
Uninterruptable Power Supplies (UPS) UPS ratings Automated shutdown of attached devices Power distribution
PDU types PDU ratings
Physical safety issues Summary Questions
Logical Security
Access control
Access control criteria Access control levels
Filesystem access control Access control to peripherals Administration access control Security and distribution groups Network access control (NAC)
Data encryption
Storage encryption
Data retention and disposal
Erasing a disk Formatting
Physically destroying a disk drive Hardening
OS hardening System hardening Application hardening Hardware hardening
Host hardware hardening Network device hardening
Endpoint security
Summary Questions
Section 4: Troubleshooting Troubleshooting Methods
Troubleshooting steps Identifying the problem
Hardware or software?
Hardware problems Software problems
Establishing a probable cause Define a plan of action Verifying functionality Documenting findings, actions, and outcomes Summary Questions
Common Hardware Issues
Hardware problems
Identifying a hardware problem Common problems
POST failure Overheating Processor failure Memory failure
Motherboard and component issues
Capacitor issues Burns USB not recognized Expansion bus
PSUs Hard Disk Drives (HDDs) Video display Other common problems
Environmental issues Summary Questions
Common Software Issues
Software problems
Hardware-related software problems Common operating systems problems
Common problem causes
User Account Control (UAC) Windows UAC
Access control
Corrupted files
Windows file recovery Linux file recovery
Hard disk space problems Lack of system resources Virtual memory problems Fragmentation Printing issues Log files Operating system monitoring tools
Summary Questions
Common Network Issues
Common network problems
Internet connectivity Configurations
Dynamic Host Configuration Protocol (DHCP) server
APIPA DHCP addresses
Other misconfigured devices
Email problems Hosts file configuration Misconfigured NIC Routing and switching issues VLAN configuration errors
Default gateway not available Firewall failure Miscellaneous common problems
Troubleshooting tools
ping tracert/traceroute ipconfig/ifconfig nslookup net use/mount nbtstat and netstat
Summary Questions
Common Storage Issues
Data storage device problems
Common HDD problems
Causes of common problems
Media failures
Hard disk media SSD media Magnetic tape media Optical drives
Common storage problems causes
Drive and connector failures
HDD problems Cable and connector problems
Storage system issues
Software-related failures Hardware-related issues Storage array issues
Administrative tools
Disk management Disk partitioning tools Map, mount, and net use Disk arrays RAID arrays
Storage monitoring tools Summary Questions
Common Security Issues
Common data security problems Causes of common security problems Security tools Summary Questions
CompTIA Server+ Examination
The exam Registering for the Exam Preparing for the exam The certification
Glossary
0-9 A B C D E F G H I J K L M N O P Q R S T U V W Z
Assessment
Chapter 1: Server Hardware Chapter 2: Server Internals Chapter 3: Data Storage Chapter 4:  Server Operating Systems Chapter 5: Addressing Chapter 6: Cabling Chapter 7: Server Administration Chapter 8: Server Maintenance Chapter 9: Virtualization Chapter 10: Disaster Recovery Chapter 11: Security Systems and Protocols Chapter 12: Physical Security and Environmental Controls Chapter 13: Logical Security Chapter 14: Troubleshooting Methods Chapter 15: Common Hardware Issues Chapter 16: Common Software Issues Chapter 17: Common Network Issues Chapter 18: Common Storage Issues Chapter 19: Common Security Issues
Other Books You May Enjoy
Leave a review - let other readers know what you think
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion