0% found this document useful (0 votes)
7 views12 pages

SK0 005 Notes and Study Guide Nmoleo Software

The document contains comprehensive notes on the CompTIA Server+ SK0-005 certification, covering topics such as server hardware installation, management, administration, security, disaster recovery, and troubleshooting. It includes detailed sections on physical hardware, storage, server operating systems, network infrastructure, and various server functions. Additionally, it addresses critical aspects like data security, access management, backup methods, and disaster recovery strategies.

Uploaded by

Grigore Mihai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views12 pages

SK0 005 Notes and Study Guide Nmoleo Software

The document contains comprehensive notes on the CompTIA Server+ SK0-005 certification, covering topics such as server hardware installation, management, administration, security, disaster recovery, and troubleshooting. It includes detailed sections on physical hardware, storage, server operating systems, network infrastructure, and various server functions. Additionally, it addresses critical aspects like data security, access management, backup methods, and disaster recovery strategies.

Uploaded by

Grigore Mihai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

CompTIA Server+ SK0-005 Notes

Nicholas Anand
November 05, 2022

Contents
1 Server Hardware Installation and Management 3
1.1 Physical Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1.1 Racking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1.2 Power . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1.3 Network Cabling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1.4 Server Chassis Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1.5 Server Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.2 Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.2.1 RAID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.2.2 Capacity planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.2.3 Hard Drive Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.2.4 Interface Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.2.5 Shared Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.3 Server Hardware Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.3.1 In-Band Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.3.2 Out-of-Band Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

2 Server Administration 7
2.1 Server Operating Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.1.1 Microsoft Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.1.2 Partitioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.1.3 File System Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.2 Network Infrastructure Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.3 Server Functions and Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.3.1 Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.4 High Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.4.1 Clustering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.5 Virtualization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.6 Scripting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.7 Asset Management and Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.7.1 Company Policies and Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.8 Licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.8.1 Licensing Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.8.2 License Count Validation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

3 Security and Disaster Recovery 9


3.1 Data Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.2 Access Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3.3 Mitigation Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3.3.1 Regulatory Constraints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3.4 Backups and Restores . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

1
CompTIA Server+ SK0-005 Notes 2

3.4.1 Backup Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10


3.4.2 Backup Rotation Schemes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.5 Disaster Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.5.1 Site Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.5.2 Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

4 Miscellaneous 12
4.1 Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
4.1.1 Troubleshooting Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
4.2 Web and Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
4.3 Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

2 Contents
3 CompTIA Server+ SK0-005 Notes

1 Server Hardware Installation and Management


1.1 Physical Hardware
1.1.1 Racking
ˆ 1 Rack Unit (RU): 1.75 in (44.45 mm)

ˆ Standard server racks are 19 inches wide

1.1.2 Power
ˆ PDU: Power Distribution Unit

ˆ UPS: Uninterruptable Power Supply

Measuring Capacity
Capacity is measured in volt-amperes (VA)
The ratio between the VA and the watts is called the power factor (PF)
VA × PF = W

1.1.3 Network Cabling


Fiber Connectors

ˆ LC: Little Connector or Lucent Connector

ˆ SC: Standard Connector or Subscriber Connector

Copper Connectors

ˆ RJ-45: Registered Jack 45

SFP

Definition
Small Form-Factor Pluggable
SFP is a compact, hot-pluggable interface module used for network communications. It is the successor
to GBIC and is sometimes referred to as mini-GBIC.
SFP Type Maximum Speed Connector
SFP 1 Gbps SFP
QSFP 4 Gbps QSFP
SFP+ 10 Gbps SFP
SFP28 25 Gbps SFP
QSFP+ 40 Gbps QSFP
QSFP28 100 Gbps QSFP

1.1.4 Server Chassis Types


ˆ Rack Server:

– Self-contained
– Space-efficient
– Cost-effective
– Densely populated racks require more cooling, which raises energy costs

1 Server Hardware Installation and Management 3


CompTIA Server+ SK0-005 Notes 4

ˆ Blade Server:

– Server enclosure that houses several modular blades


– Typically fits in a rack
– Energy efficient
– High processing power in a small space

ˆ Tower Server:

– Stand-alone server chassis


– Not rack-mountable
– Resembles a desktop computer
– Low cooling costs
– Large footprint

1.1.5 Server Components


ˆ ECC: Error Checking and Correction

ˆ PCI: Peripheral Component Interconnect

ˆ HBA: Host Bus Adapter - circuit board or IC that connects a host system to a storage or network
device

ˆ CMOS: Complimentary Metal Oxide Semiconductor

Memory Types
Memory Type DIMM Pins SO-DIMM Pins
DDR 184 200
DDR2 240 200
DDR3 240 204
DDR4 288 260
DDR5 288 262
Bus Types
Type Width Speed Bandwidth
8-bit ISA 8 bits 8.3 MHz 7.9 Mbps
ISA 16 bits 8.3 MHz 15.9 Mbps
EISA 32 bits 8.3 MHz 31.8 Mbps
VESA/VL 32 bits 33 MHz 127.2 Mbps
PCI 32 bits 33 MHz 127.2 Mbps
64-bit PCI 64 bits 66 MHz 508.6 Mbps
PCMCIA 32 bits 33 MHz
AGP 32-bit Speed of Processor

1.2 Storage
ˆ DAS: Direct Attached Storage

ˆ VSS: Volume Shadow Service - Microsoft technology that can create snapshots of files or volumes,
even when they are in use. Requires NTFS or ReFS.

4 1 Server Hardware Installation and Management


5 CompTIA Server+ SK0-005 Notes

1.2.1 RAID

Definition
Redundant Array of Independant Disks
RAID is a data storage virtualization technology that combines multiple drives into one or more logical units
for the purposes of data redundancy, performance improvement, or both.

RAID Level Comparison


Type Min Drives Fault Tolerance Read Perf. Write Perf. Capacity Util.
RAID 0 2 None Very good Excellent 100%
RAID 1 2 1 drive Very good Good 50%
RAID 3 3 1 drive Very good Good 67-96%
RAID 5 3 1 drive Very good Good 67-96%
RAID 6 4 2 drives Very good Fair 50-92%

RAID Level Diagrams

JBOD

Definition
Just a Bunch of Disks
The term JBOD is sometimes used to refer to a collection of drives in one single storage enclosure that are
not configured in a RAID array.

1.2.2 Capacity planning

ˆ Thin provisioning: Using virtualization technology to trick applications into thinking you have more
storage than is actually available

1 Server Hardware Installation and Management 5


CompTIA Server+ SK0-005 Notes 6

1.2.3 Hard Drive Media


ˆ RPM: Rotations per Minute

1.2.4 Interface Types


ˆ SCSI: Small Computer System Interface - used for transferring data between computer and peripherals
over a parallel connection

– LUN: Logical Unit Number - used to identify a SCSI device


– LUN Masking: An authorization mechanism used in SANs to make LUNs available to some
hosts but not others

ˆ ATA: Advanced Technology Attachment

ˆ SATA: Serial ATA

ˆ eSATA: External SATA

ˆ iSCSI: Internetworking SCSI

ˆ SAS: Serial Attached SCSI

1.2.5 Shared Storage


ˆ NFS: Network File System

ˆ SMB: Server Message Block

ˆ CIFS: Common Internet File System - a dialect of SMB

Fibre Channel

Definition
Fibre Channel is a high-speed data transfer protocol that provides in-order, lossless delivery of data

ˆ FCoE: Fibre Channel over Ethernet - allows the Fibre Channel protocol to be transmitted over an
Ethernet link

ˆ WWNN: World Wide Node Name - universally unique identifier assigned to a device on a fibre channel
network - similar to a MAC address

ˆ WWN/WWPN: World Wide (Port) Name - WWNN for a specific port of a device on a fibre channel
network

1.3 Server Hardware Maintenance


ˆ BIOS: Basic Input/Output System

ˆ UEFI: Unified Extensible Firmware Interface

1.3.1 In-Band Management


ˆ VNC: Virtual Network Computing - an open-source protocol for remote GUI access

ˆ RDP: Remote Desktop Protocol - a Microsoft proprietary protocol for remote GUI access

ˆ RAS: Remote Access Server - provides a suite of services used for remote access

6 1 Server Hardware Installation and Management


7 CompTIA Server+ SK0-005 Notes

1.3.2 Out-of-Band Management

ˆ Crash cart: Mobile cart with a secured laptop that is used to provide a direct connection to malfunc-
tioning servers

ˆ iDRAC: Integrated Dell Remote Access Controller - allows for local and remote management of
PowerEdge servers

ˆ iLO: Integrated Lights Out - HP out of band server management technology

ˆ IPMI: Intelligent Platform Management Interface - set of specifications for an autonomous computer
subsystem that provides management and monitoring capabilities independently of the host system’s
operating system and hardware. Commonly used for out of band management.

2 Server Administration
2.1 Server Operating Systems
ˆ HCL: Hardware Compatibility List

ˆ PXE: Preboot Execution Environment - client boots an OS over the network

ˆ P2V: Physical to Virtual

2.1.1 Microsoft Windows

ˆ AD: Active Directory

– OU: Organizational Unit - container within an Active Directory domain

ˆ SCCM: System Center Configuration Management - also known as Microsoft Endpoint Configuration
Manager. Used to manage, control, inventory, and patch large groups of computers.

ˆ WSUS: Windows Software Update Services

ˆ WDS: Windows Deployment Services - allows you to deploy Windows operating systems over the
network

ˆ RIS: Remote Installation Services - Microsoft PXE server used to remotely execute boot environment
variables

ˆ WMI: Windows Management Instrumentation - extensions to the Windows driver model that allow
scripting languages to manage Windows computers and servers

2.1.2 Partitioning

ˆ GPT: GUID Partition Table

ˆ MBR: Master Boot Record

2 Server Administration 7
CompTIA Server+ SK0-005 Notes 8

2.1.3 File System Types

ˆ NTFS: New Technology File System

– Microsoft proprietary file system used in Windows


– When using an NTFS file system, a user must have the Modify permission to delete files

ˆ ZFS: Z File System

ˆ EFS: Encrypting File System

ˆ ReFS: Resilient File System - Microsoft proprietary file system designed to maximize data availability
and scale efficiently

2.2 Network Infrastructure Services


ˆ RFC: Request for Comments

ˆ SNMP: Simple Network Management Protocol

– OID: Object Identifier


– MIB: Management Information Base

2.3 Server Functions and Features


2.3.1 Monitoring

ˆ IOPS: Input/Output Operations per Second

2.4 High Availability


2.4.1 Clustering

Definition
A server cluster consists of a group of servers working simultaneously under a single IP address.

ˆ Active-active: Client workloads are distributed across two or more nodes

ˆ Active-passive: One node is used to handle all requests, while one or more additional nodes are
designated as backups in case the active node goes down.

2.5 Virtualization
ˆ Intel-VT: Intel Virtualization Technology - provides hardware assistance to virtualization software

ˆ Type 1 Hypervisor: Runs directly on the hardware (e.g. Proxmox)

ˆ Type 2 Hypervisor: Runs on a conventional operating system (e.g. VirtualBox)

2.6 Scripting
ˆ Bootstrap: The process of loading a set of instructions when a computer is first powered on

8 2 Server Administration
9 CompTIA Server+ SK0-005 Notes

2.7 Asset Management and Documentation


2.7.1 Company Policies and Procedures
ˆ BCP: Business Continuity Plan

ˆ DRP: Disaster Recovery Plan

ˆ BIA: Business Impact Analysis

ˆ COOP: Continuity of Operations

ˆ MTTR: Mean Time to Repair

ˆ MTBF: Mean Time Between Failures

ˆ RTO: Recovery Time Objective - targeted duration of time between failure and resuming normal
operations

ˆ RPO: Recovery Point Objective - maximum length of time permitted that data can be restored from
- maximum tolerable amount of data loss

Service Level Agreements (SLA)


Availibility % Downtime per year Downtime per month Downtime per week
99% 3.65 days 7.2 hours 1.68 hours
99.9% 8.76 hours 43.2 minutes 10.1 minutes
99.99% 52.56 minutes 4.32 minutes 1.01 minutes
99.999% 5.26 minutes 25.9 seconds 6.05 seconds
99.9999% 31.5 seconds 2.59 seconds 0.605 seconds

2.8 Licensing
2.8.1 Licensing Models
ˆ Per-socket: Licence costs are determined using the number of CPU cores

ˆ Site-based: A software package can be installed on multiple computers at the same physical location

ˆ Node-locked: A license for a software application is assigned to one or more specific hardware devices

2.8.2 License Count Validation


ˆ True-up: A company compares the number of actual software license users to the good faith estimate
of the initial contract

3 Security and Disaster Recovery


3.1 Data Security
ˆ The cost of protecting yourself against a threat should be less than the cost of recovering from the
theat

ˆ PKI: Public Key Infrastructure - a set of roles, policies, hardware, software, and procedures needed
to create, manage, distribute, use, store, and revoke certificates and keys

ˆ XD: Execute Disable Bit - allows a processor to distinguish between bits of code that should and
should not be executed

3 Security and Disaster Recovery 9


CompTIA Server+ SK0-005 Notes 10

3.2 Access Management


ˆ RADIUS: Remote Authentication Dial-In User Service

ˆ TACACS: Terminal Access Controller Access Control System

3.3 Mitigation Strategies


3.3.1 Regulatory Constraints
ˆ PCI DSS: Payment Card Industry Data Security Standard

3.4 Backups and Restores


ˆ DLT: Digital Linear Tape

ˆ LTO: Linear Tape-Open - magnetic data storage technology

ˆ Archive bit: A file attribute used to indicate whether or not the file has been backed up

ˆ Snapshot: A type of backup copy used to create an exact copy of an entire application, disk, or
system.

ˆ Image: Another term for a snapshot

3.4.1 Backup Methods


ˆ Incremental backup

– Includes the data that has changed since the previous backup
– Storage efficient and has the fastest backup time
– Slow recovery
– A single corrupted incremental backup file would ruin the entire backup

ˆ Differential backup

– Includes the data that has changed since the last full backup
– Fast recovery
– Not storage efficient and requires regular full backups
– Does not clear the archive bit

ˆ Full backup

– Complete copy of the data


– Takes the longest amount of time and uses the most storage space
– Fastest recovery

ˆ Synthetic backup

– Combines the last full backup and all the incremental backups into one single backup file that
contains the same data as the full backup
– Takes less time than a full backup and is more storage efficient
– Not as effective if lots of changes are made and still relies on incremental backups

10 3 Security and Disaster Recovery


11 CompTIA Server+ SK0-005 Notes

3.4.2 Backup Rotation Schemes


ˆ First in, first out (FIFO)
– New backups are saved over the oldest backups
– The backup depth would be the number of days a backup is kept
ˆ Grandfather-father-son (GFS)
– 3 or more FIFO cycles
– For example, one daily rotation, one weekly rotation, and one monthly rotation
– Protects against an issue that could have corrupted backups and gone unnoticed
ˆ Tower of Hanoi
– First tape is used every other day (1, 3, 5, 7, 9)
– Second tape is used every fourth day (2, 6, 10)
– Third tape is used every eighth day (4, 12, 20)
– Provides the most optimal usage of a limited number of tapes

3.5 Disaster Recovery


ˆ Failover: The process of switching production to a backup facility
ˆ Failback: The process of returning production to its original location after a disaster or maintenance
period has been resolved
ˆ Heartbeat: A periodic signal generated by hardware or software to indicate normal operation

3.5.1 Site Types


ˆ Hot site: A mirror of an existing data center. Populated with servers, cooling, power, and offices.
Files, applications, and databases are synchronized with the primary site.
ˆ Warm site: The middle ground between a hot and cold site. Populated with some pre-installed
hardware, but applications are not deployed and the data is not stored here. Also known as a standby
site.
ˆ Cold site: Office or datacenter space without any existing equipment installed. Populated with power,
cooling, and office space. Requires extensive work to bring up and running.
ˆ Cloud site

3.5.2 Replication

Definition
Replication is the process of making multiple copies of data and storing them at different locations for the
purposes of backups, fault tolerance, and improving accessibility.

Replication Types

ˆ Full: All data is stored in multiple locations


ˆ Partial: Some data is stored in multiple locations while other data is only stored in a single location
ˆ Asynchronous: Data is written to the primary storage and then copied to the replica
ˆ Synchronous: Data is written to the primary and secondary storages at the same time

3 Security and Disaster Recovery 11


CompTIA Server+ SK0-005 Notes 12

4 Miscellaneous
4.1 Troubleshooting
4.1.1 Troubleshooting Steps
1. Identify the problem
2. Establish a theory of probable cause
3. Test the theory to determine the cause

4. Establish a plan of action to resolve the problem


5. Implement the solution or escalate as necessary
6. Verify full system functionality and implement preventive measures
7. Perform a root cause analysis

8. Document your findings

4.2 Web and Networking


ˆ NOS: Network Operating System - operating system that allows multiple computers to communicate
and share files and hardware devices with each other
ˆ IIS: Internet Information Services - Microsoft web server software

ˆ URL: Uniform/Universal Resource Locator

ˆ WINS: Windows Internet Naming Service - legacy service that maps NetBIOS names to IP addresses

ˆ MDI: Medium Dependent Interface - uses a crossover cable to connect

ˆ MDI-X: Medium Dependent Interface Crossover - uses a straight-through cable rather than a crossover
cable

ˆ Auto MDI/MDIX: Automatically chooses between MDI and MDI-X

ˆ DHCP uses UDP port 68

4.3 Hardware
ˆ CRU: Customer Replaceable Unit

ˆ FRU: Field Replaceable Unit

ˆ HID: Human Interface Device

12 4 Miscellaneous

You might also like