Muutke küpsiste eelistusi

CompTIA Serverplus Certification All-in-One Exam Guide (Exam SK0-004) [Pehme köide]

  • Formaat: Paperback / softback, 450 pages, kõrgus x laius x paksus: 239x191x38 mm, kaal: 880 g, 50 Illustrations
  • Ilmumisaeg: 12-Aug-2018
  • Kirjastus: McGraw-Hill Education
  • ISBN-10: 125983803X
  • ISBN-13: 9781259838033
Teised raamatud teemal:
  • Pehme köide
  • Hind: 69,39 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 450 pages, kõrgus x laius x paksus: 239x191x38 mm, kaal: 880 g, 50 Illustrations
  • Ilmumisaeg: 12-Aug-2018
  • Kirjastus: McGraw-Hill Education
  • ISBN-10: 125983803X
  • ISBN-13: 9781259838033
Teised raamatud teemal:

This comprehensive study guide delivers 100% coverage of all topics on the latest version of the CompTIA Server+ exam

Take the CompTIA Server+ exam (exam SK0-004) with complete confidence using the detailed information contained in this highly effective self-study resource. Written by a well-respected PC authority and experienced author, the book serves both a powerful exam preparation tool and an ideal on-the-job reference.

CompTIA Server+® Certification All-in-One Exam Guide (Exam SK0-004) offers complete coverage of every topic on the latest version of the exam. You will learn how to plan, build, secure, and maintain a variety of server equipment with the most commonly used systems in the industry. Up-to-date details are included on server architecture, administration, security, recovery, troubleshooting, and virtualization. To aid in learning, the book provides learning objectives at the beginning of each chapter, exam tips throughout, 300 practice exam questions, and in-depth answers and explanations.

• Practice questions match the tone, content, and format of those on the actual exam
• Electronic content includes additional practice questions and a PDF copy of the book
• Written by an experienced technical writer and PC expert

Preface xvii
Acknowledgments xviii
Introduction xix
Chapter 1 Introduction to CompTIA Server+ Essentials
1(22)
Why This Book Is Relevant
1(1)
Server Hardware Basics
2(3)
Server Form Factors
3(1)
Server CPUs
3(1)
Server Memory
3(1)
Buses and Slots
4(1)
Virtualization
4(1)
Environmental Factors
4(1)
Storage
5(1)
Network Concepts
6(1)
Cables and Connectors
6(1)
IP
6(1)
Ports and Protocols
7(1)
Server Operating Systems
7(3)
Server Roles
8(1)
Maintenance
9(1)
Monitoring
9(1)
Security Considerations
10(2)
Hardening
10(1)
Network Security
11(1)
Troubleshooting and Optimizing Performance
12(2)
Optimizing Performance
12(1)
Troubleshooting
12(2)
Preparing for the Worst
14(1)
Chapter Review
14(9)
Questions
15(3)
Questions and Answers
18(5)
Chapter 2 Server Hardware
23(42)
Server Form Factors
23(6)
Tower Servers
24(1)
Rack-mounted Equipment
25(2)
Blade Servers
27(2)
Server Components
29(11)
BIOS
29(1)
UEFI
30(1)
CPUs
31(3)
Memory
34(1)
Buses
35(2)
NICs
37(1)
Storage
38(1)
USB
39(1)
Power
40(4)
Voltage
41(1)
Wattage
42(1)
UPS
43(1)
Environmental Controls
44(2)
Temperature
44(1)
Air Flow
44(1)
Humidity
44(1)
Fire Suppression
45(1)
Hands-on Exercises
46(3)
Exercise 2-1 Calculate Rack Space
46(1)
Exercise 2-2 Create a Windows Server 2012 R2 Virtual Machine Configuration
46(2)
Exercise 2-3 Create a Red Hat Enterprise Linux 7 Virtual Machine Configuration
48(1)
Chapter Review
49(16)
Server Form Factors
49(1)
Server Components
49(1)
Power
50(1)
Environmental Controls
50(1)
Questions
51(5)
Questions and Answers
56(9)
Chapter 3 Server Operating Systems
65(58)
Server Roles
65(13)
Infrastructure Roles
66(8)
Other Server Roles
74(4)
Virtualization Servers
78(5)
Hypervisor Types
79(1)
Hypervisor Host Configuration
80(1)
Virtual Machine Guest Configuration
81(2)
Server Installation
83(2)
Installing a Type 1 Hypervisor
83(1)
Installing a Server Operating System
83(2)
Server Administration Methods
85(5)
KVM
86(1)
Out-of-band Remote Administration
86(1)
In-band Remote Administration
87(3)
Server Documentation
90(4)
Asset Life Cycle
90(1)
Asset Inventory
91(2)
Service Level Agreements
93(1)
Other Documentation
94(1)
Maintaining Servers
94(2)
Patch Management
94(1)
Proactive Maintenance
95(1)
Reactive Maintenance
96(1)
Hands-on Exercises
96(10)
Exercise 3-1 Install the Microsoft Windows Server 2012 R2 Operating System
96(3)
Exercise 3-2 Install the DNS Server Role in Windows Server 2012 R2
99(1)
Exercise 3-3 Configure the DNS Server in Windows Server 2012 R2
100(1)
Exercise 3-4 Install the DHCP Server in Windows Server 2012 R2
101(1)
Exercise 3-5 Install an Active Directory Server in Windows Server 2012 R2
102(1)
Exercise 3-6 Install the Red Hat Enterprise Linux 7 Operating System
103(3)
Exercise 3-7 Configure Windows Server 2012 R2 to Use Internet NTP Time
106(1)
Chapter Review
106(17)
Server Roles
106(1)
Virtualization Servers
107(1)
Server Installation
108(1)
Server Administration Methods
108(1)
Server Documentation
108(1)
Server Maintenance
109(1)
Questions
109(6)
Questions and Answers
115(8)
Chapter 4 Storage
123(40)
Storage Technologies
123(10)
Magnetic Hard Disks
124(1)
Solid-State Drives
124(1)
Hybrid Drives
125(1)
Storage Tiers
126(1)
Disk Interfaces
127(1)
Optical Drives
127(1)
Cloud Storage
128(1)
Direct-Attached Storage
129(1)
Network-Attached Storage
129(3)
Storage Area Networks
132(1)
Storage Capacity and Future Growth
133(4)
Base 2 vs. Base 10
133(1)
Where Did All the Disk Space Go?
134(1)
Using Less Disk Space
134(3)
RAID Configuration
137(4)
RAID Levels
138(3)
Storage Device Installation
141(4)
MBR and GPT
141(1)
File Systems
142(2)
Sample Scenario 1
144(1)
Sample Scenario 2
144(1)
Hands-on Exercises
145(6)
Exercise 4-1 Configure a Windows Server 2012 R2 iSCSI Target
145(1)
Exercise 4-2 Use the Red Hat Enterprise Linux 7 iSCSI Initiator to Connect to an iSCSI Target
146(1)
Exercise 4-3 Configure Software RAID Using Windows Server 2012 R2
147(1)
Exercise 4-4 Configure Software RAID Using Red Hat Enterprise Linux 7
148(1)
Exercise 4-5 Monitor Disk Space Using File Server Resource Manager
149(1)
Exercise 4-6 Set a Disk Quota Using File Server Resource Manager
150(1)
Exercise 4-7 Retrieve Disk Information Using PowerShell
150(1)
Chapter Review
151(12)
Storage Device Characteristics
151(1)
Disk Interfaces
151(1)
Local and Network Storage
151(1)
Storage Capacity Planning
151(1)
RAID
152(1)
Disk Initialization and File Systems
152(1)
Questions
152(4)
Questions and Answers
156(7)
Chapter 5 Network Concepts
163(46)
The OSI Model
163(2)
Cable Installation and Management
165(6)
Cable Placement
165(1)
Cable Labeling
165(1)
Cable Types
166(5)
Network Hardware
171(5)
Network Interface Cards
171(2)
Network Switches
173(2)
Routers
175(1)
Configuring IPv4
176(6)
PAT
177(1)
NAT
177(1)
IP
178(1)
IPv4 Addressing
178(1)
Subnet Mask
178(1)
Reserved Internal IP Address Ranges
179(1)
When to Use Subnetting
180(2)
Configuring IPv6
182(2)
IPv6 Addressing
182(1)
IPv6 Settings
183(1)
IPv6 Transition Technologies
184(1)
Network Infrastructure Services
184(3)
Default Gateway
184(1)
DNS Servers
185(1)
WINS Servers
186(1)
DHCP
186(1)
TCP and UDP
187(4)
TCP
187(1)
UDP
188(3)
Hands-on Exercises
191(4)
Exercise 5-1 Manually Configure IPv6 on Windows Server 2012 R2
191(1)
Exercise 5-2 Manually Configure IPv6 on Red Hat Enterprise Linux 7
192(1)
Exercise 5-3 Install and Configure NAT on Windows Server 2012 R2
193(1)
Exercise 5-4 Use Wireshark to Capture and Analyze HTTP Traffic
194(1)
Chapter Review
195(14)
The OSI Model
196(1)
Cables and Connectors
196(1)
Network Interface Cards
196(1)
IPv4 and IPv6
196(1)
IP, TCP, and UDP
197(1)
Questions
197(5)
Questions and Answers
202(7)
Chapter 6 Security
209(52)
Physical Security
209(6)
Premises Access
209(2)
The Human Element
211(1)
Authentication
211(4)
Under Lock and Key
215(1)
Logical Access Control
215(8)
Groups
215(1)
Dynamic Access Control
216(1)
Roles
216(2)
Rights and Permissions
218(1)
File System Permissions
218(3)
Peripheral Devices
221(2)
Network Security
223(12)
NAC
223(2)
VLANs
225(1)
Firewalls
226(3)
Security Zones
229(1)
PKI
230(2)
IPSec
232(2)
VPNs
234(1)
Intrusion Detection and Prevention Systems
234(1)
Hardening
235(3)
Operating System Hardening
235(1)
Hardware Hardening
236(1)
Application Hardening
237(1)
Data Security
238(5)
Data and Mobile Devices
238(1)
Encrypting Data at Rest
238(2)
Tape Encryption
240(1)
Secure Media Disposal
241(2)
Hands-on Exercises
243(5)
Exercise 6-1 Set NTFS File System Permissions
243(1)
Exercise 6-2 Set Shared Folder Permissions
244(1)
Exercise 6-3 Set File System Permissions in Linux
244(1)
Exercise 6-4 Use EFS to Encrypt Files in Windows
245(1)
Exercise 6-5 Use OpenSSL to Encrypt Files in Linux
245(1)
Exercise 6-6 Use iptables to Set Firewall Rules in Linux
246(1)
Exercise 6-7 Enable Encrypted Communication on a Windows IIS Web Server
246(2)
Chapter Review
248(13)
Physical Security
248(1)
Authentication
248(1)
Logical Access Control
248(1)
Network Security
249(1)
Firewalls
249(1)
PKI
249(1)
IPSec
249(1)
VPNs
250(1)
Intrusion Detection and Prevention
250(1)
Hardening
250(1)
Data Security
250(1)
Secure Media Disposal
250(1)
Questions
251(4)
Questions and Answers
255(6)
Chapter 7 Troubleshooting and Performance Optimization
261(46)
Troubleshooting Methodology
261(7)
Identify the Problem
262(3)
Establish a Theory of Probable Cause
265(1)
Test the Theory
265(1)
Establish a Plan of Action
266(1)
Implement a Solution or Escalate
266(1)
Verify Functionality
266(1)
Perform Root Cause Analysis
267(1)
Document the Solution
268(1)
Hardware Problems and Solutions
268(1)
Software Problems and Solutions
268(6)
Storage Problems and Solutions
274(4)
Windows Tools
274(2)
Linux Tools
276(2)
Network Problems and Solutions
278(3)
Name Resolution Issues
280(1)
Security Problems and Solutions
281(6)
Malware Troubleshooting
281(1)
Too Few Permissions
282(2)
Too Many Permissions
284(1)
Too Much Running
285(1)
Confidentiality and Integrity
285(2)
Performance Optimization
287(2)
Hardware Optimization
287(1)
Software Optimization
287(1)
Network Optimization
288(1)
Hands-on Exercises
289(2)
Exercise 7-1 Explore Windows Performance Monitoring Tools
289(1)
Exercise 7-2 Explore Linux Performance Monitoring Tools
290(1)
Exercise 7-3 Use Windows PowerShell to Retrieve Event Log Information
290(1)
Exercise 7-4 View Linux Log File Entries
291(1)
Chapter Review
291(16)
Troubleshooting Methodology
291(1)
Hardware Problems and Solutions
292(1)
Software Problems and Solutions
292(1)
Storage Problems and Solutions
293(1)
Network Problems and Solutions
293(1)
Security Problems and Solutions
293(1)
Performance Optimization
294(1)
Questions
294(5)
Questions and Answers
299(8)
Chapter 8 Preparing for the Worst
307(34)
Disaster Recovery
307(8)
Alternate Sites
307(4)
Data Replication
311(3)
Business Impact Analysis
314(1)
Business Continuity
315(2)
Disaster Recovery Plan
315(1)
Business Continuity Plan
316(1)
Data Backup
317(8)
Backup Types
317(4)
Backup Media
321(1)
On-premises Backup
322(1)
Cloud Backup
323(1)
Backup and Restore Best Practices
323(2)
Hands-on Exercises
325(3)
Exercise 8-1 Configure the Volume Shadow Service on Windows Server 2012 R2
325(1)
Exercise 8-2 Restore Previous Versions of Files in Windows
325(1)
Exercise 8-3 Configure and Use Windows Server Backup
326(2)
Exercise 8-4 Use the Linux tar Command for Data Backup
328(1)
Chapter Review
328(13)
Disaster Recovery Sites
328(1)
Data Replication
329(1)
Business Impact
329(1)
Disaster Recovery Plan
329(1)
Business Continuity Plan
330(1)
Data Backups
330(1)
Questions
331(4)
Questions and Answers
335(6)
Appendix A About the Hands-on Exercises and Lab Set-up
341(6)
Lab Exercise Overview
341(1)
Windows
342(1)
Linux
342(1)
Requirements for Hands-on Exercises
342(4)
Hardware Requirements
343(1)
VMware Workstation 10
343(1)
Install VMware Workstation 10
343(2)
Acquiring Windows and Linux Installation Media
345(1)
Lab Exercise Miscellany
346(1)
Appendix B URL Reference
347(4)
Appendix C Real-World Best Practices
351(8)
Server Installation
351(1)
Virtualization
352(1)
Cloud Computing
352(2)
Storage
354(1)
Networks
355(1)
Security
355(4)
Appendix D CompTIA Server+ Certification Exam Objectives (SK0-004)
359(24)
1.0 Server Architecture
359(1)
1.1 Explain the purpose and function of server form factors
359(1)
1.2 Given a scenario, install, configure and maintain server components
360(1)
1.3 Compare and contrast power and cooling components
361(1)
2.0 Server Administration
361(1)
2.1 Install and configure server operating systems
361(1)
2.2 Compare and contrast server roles and requirements for each
362(1)
2.3 Given a scenario, use access and control methods to administer a server
363(1)
2.4 Given a scenario, perform proper server maintenance techniques
363(2)
2.5 Explain the importance of asset management and documentation
365(1)
2.6 Explain the purpose and operation of virtualization components
366(1)
3.0 Storage
366(1)
3.1 Given a scenario, install and deploy primary storage devices based on given specifications and interfaces
366(1)
3.2 Given a scenario, configure RAID using best practices
367(1)
3.3 Summarize hardware and features of various storage technologies
367(1)
3.4 Given a scenario, calculate appropriate storage capacity and plan for future growth
368(1)
4.0 Security
368(1)
4.1 Compare and contrast physical security methods and concepts
368(1)
4.2 Given a scenario, apply server hardening techniques
369(1)
4.3 Explain basic network security systems and protocols
370(1)
4.4 Implement logical access control methods based on company policy
370(1)
4.5 Implement data security methods and secure storage disposal techniques
371(1)
4.6 Given a scenario, implement proper environmental controls and techniques
371(1)
5.0 Networking
372(1)
5.1 Given a scenario, configure servers to use IP addressing and network infrastructure services
372(1)
5.2 Compare and contrast various ports and protocols
373(1)
5.3 Given a scenario, install cables and implement proper cable management procedures
374(1)
6.0 Disaster Recovery
374(1)
6.1 Explain the importance of disaster recovery principles
374(1)
6.2 Given a scenario, implement appropriate backup techniques
375(1)
7.0 Troubleshooting
376(1)
7.1 Explain troubleshooting theory and methodologies
376(1)
7.2 Given a scenario, effectively troubleshoot hardware problems, selecting the appropriate tools and methods
376(1)
7.3 Given a scenario, effectively troubleshoot software problems, selecting the appropriate tools and methods
377(1)
7.4 Given a scenario, effectively diagnose network problems, selecting the appropriate tools and methods
378(1)
7.5 Given a scenario, effectively troubleshoot storage problems, selecting the appropriate tools and methods
379(2)
7.6 Given a scenario, effectively diagnose security issues, selecting the appropriate tools and methods
381(2)
Appendix E About the CD-ROM
383(2)
System Requirements
383(1)
Installing and Running Total Tester Premium Practice Exam Software
383(1)
Total Tester Premium Practice Exam Software
383(1)
Secured Book PDF
384(1)
Technical Support
384(1)
Glossary 385(24)
Index 409
Daniel Lachance, MCITP, MCTS, CNI, IBM Certified Instructor, CompTIA A+, CompTIA Network+, CompTIA Security+, is a technical trainer for Global Knowledge and has delivered classroom training for a wide variety of products for the past 17 years. Throughout his career he has also developed custom applications and planned, implemented, troubleshot, and documented various network configurations. Lachance was the technical editor on CompTIA Network+ Certification Study Guide, Fourth Edition and other certification books.