Introduction |
|
xxi | |
Assessment Test |
|
li | |
Chapter 1 Server Hardware |
|
1 | (42) |
|
|
3 | (8) |
|
|
3 | (3) |
|
|
6 | (1) |
|
|
7 | (4) |
|
Installing and Configuring Server Components |
|
|
11 | (18) |
|
|
11 | (5) |
|
|
16 | (3) |
|
Bus Types, Bus Channels, and Expansion Slots |
|
|
19 | (2) |
|
|
21 | (1) |
|
|
22 | (3) |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
26 | (2) |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
29 | (1) |
|
Maintaining Power and Cooling Requirements |
|
|
29 | (8) |
|
|
29 | (5) |
|
|
34 | (3) |
|
|
37 | (1) |
|
|
37 | (2) |
|
|
39 | (4) |
Chapter 2 Installing and Configuring Servers |
|
43 | (48) |
|
Installing and Configuring Server Operating Systems |
|
|
45 | (21) |
|
Determining the Server Role/Purpose |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
46 | (3) |
|
|
49 | (5) |
|
|
54 | (1) |
|
|
55 | (1) |
|
Connecting to the Network |
|
|
56 | (1) |
|
Joining a Domain/Directory |
|
|
56 | (1) |
|
Addressing Security Concerns |
|
|
57 | (1) |
|
|
58 | (2) |
|
Installing Features, Roles, Applications, and Drivers |
|
|
60 | (1) |
|
|
60 | (3) |
|
Unattended/Remote Installations |
|
|
63 | (3) |
|
Using Access and Control Methods to Administer a Server |
|
|
66 | (7) |
|
Local Hardware Administration |
|
|
66 | (3) |
|
Network-Based Hardware Administration |
|
|
69 | (2) |
|
Network-Based Operating System Administration |
|
|
71 | (2) |
|
Purpose and Operation of Virtualization Components |
|
|
73 | (12) |
|
|
73 | (1) |
|
Management Interface for Virtual Machines |
|
|
74 | (1) |
|
|
74 | (3) |
|
Hardware Compatibility List |
|
|
77 | (1) |
|
Resource Allocation Between Guest and Host |
|
|
78 | (7) |
|
|
85 | (1) |
|
|
85 | (2) |
|
|
87 | (4) |
Chapter 3 Server Maintenance |
|
91 | (44) |
|
Server Roles and Requirements |
|
|
93 | (7) |
|
|
93 | (1) |
|
|
94 | (1) |
|
Directory Services Server |
|
|
95 | (1) |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
98 | (1) |
|
|
98 | (1) |
|
Routing and Remote Access Service (RRAS) Server |
|
|
98 | (1) |
|
|
99 | (1) |
|
Proper Server Maintenance Techniques |
|
|
100 | (23) |
|
|
101 | (1) |
|
|
101 | (3) |
|
Outages and Service-Level Agreements |
|
|
104 | (1) |
|
|
105 | (3) |
|
|
108 | (12) |
|
Fault Tolerance and High Availability Techniques |
|
|
120 | (3) |
|
Asset Management and Documentation |
|
|
123 | (7) |
|
|
123 | (2) |
|
|
125 | (4) |
|
Secure Storage of Sensitive Documentation |
|
|
129 | (1) |
|
|
130 | (1) |
|
|
130 | (1) |
|
|
131 | (4) |
Chapter 4 Storage Technologies |
|
135 | (22) |
|
Hardware and Features of Various Storage Technologies |
|
|
136 | (8) |
|
Direct Attached Storage (DAS) |
|
|
136 | (1) |
|
Network-Attached Storage (NAS) |
|
|
136 | (1) |
|
Storage Area Networks (SANS) |
|
|
137 | (3) |
|
|
140 | (2) |
|
|
142 | (1) |
|
|
142 | (2) |
|
|
144 | (1) |
|
Flash, Compact Flash, and USB Drive |
|
|
144 | (1) |
|
Installing and Deploying Primary Storage Devices |
|
|
144 | (8) |
|
|
144 | (2) |
|
|
146 | (4) |
|
|
150 | (2) |
|
|
152 | (1) |
|
|
152 | (1) |
|
|
153 | (4) |
Chapter 5 Identifying Capacity and Fault Tolerance Requirements |
|
157 | (22) |
|
Calculating Appropriate Storage Capacity and Planning for Future Growth |
|
|
158 | (6) |
|
Base 10 vs. Base 2 Disk Size Calculation |
|
|
158 | (1) |
|
|
159 | (1) |
|
|
160 | (1) |
|
Capacity Planning Considerations |
|
|
160 | (4) |
|
|
164 | (9) |
|
RAID Levels and Performance Considerations |
|
|
165 | (2) |
|
Software vs. Hardware RAID |
|
|
167 | (2) |
|
Configuration Specifications |
|
|
169 | (2) |
|
Hot-Swap Support and Ramifications |
|
|
171 | (1) |
|
|
171 | (1) |
|
|
171 | (2) |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
174 | (5) |
Chapter 6 Securing the Server |
|
179 | (42) |
|
Physical Security Methods and Concepts |
|
|
180 | (7) |
|
Multifactor Authentication |
|
|
180 | (1) |
|
|
181 | (6) |
|
Server Hardening Techniques |
|
|
187 | (9) |
|
|
187 | (2) |
|
|
189 | (1) |
|
Remediating Security Issues Based on a Vulnerability Scan |
|
|
190 | (2) |
|
|
192 | (4) |
|
Proper Environmental Controls and Techniques |
|
|
196 | (19) |
|
Power Concepts and Best Practices |
|
|
197 | (9) |
|
|
206 | (9) |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
216 | (5) |
Chapter 7 Securing Server Data and Network Access |
|
221 | (32) |
|
Basic Network Security Systems and Protocols |
|
|
222 | (13) |
|
|
222 | (4) |
|
|
226 | (2) |
|
|
228 | (1) |
|
|
229 | (1) |
|
|
229 | (1) |
|
|
230 | (2) |
|
|
232 | (1) |
|
|
232 | (1) |
|
|
233 | (1) |
|
|
234 | (1) |
|
Logical Access Control Methods |
|
|
235 | (8) |
|
|
235 | (5) |
|
|
240 | (3) |
|
Data Security Methods and Secure Storage Disposal Techniques |
|
|
243 | (4) |
|
|
243 | (2) |
|
|
245 | (2) |
|
|
247 | (1) |
|
|
247 | (1) |
|
|
248 | (5) |
Chapter 8 Networking |
|
253 | (40) |
|
Configuring Servers to Use IP Addressing and Network Infrastructure Services |
|
|
255 | (20) |
|
|
255 | (1) |
|
|
256 | (1) |
|
CIDR Notation and Subnetting |
|
|
256 | (1) |
|
Public and Private IP Addressing |
|
|
257 | (1) |
|
Static IP Assignment vs. DHCP |
|
|
258 | (1) |
|
|
259 | (6) |
|
|
265 | (1) |
|
|
265 | (2) |
|
|
267 | (1) |
|
|
267 | (2) |
|
Network Interface Card Configuration |
|
|
269 | (6) |
|
|
275 | (3) |
|
|
275 | (1) |
|
|
276 | (1) |
|
|
276 | (1) |
|
|
276 | (1) |
|
|
276 | (1) |
|
|
276 | (1) |
|
|
276 | (1) |
|
|
277 | (1) |
|
|
277 | (1) |
|
|
277 | (1) |
|
|
277 | (1) |
|
|
277 | (1) |
|
|
277 | (1) |
|
|
277 | (1) |
|
|
278 | (1) |
|
|
278 | (1) |
|
|
278 | (1) |
|
|
278 | (1) |
|
Cable Management Procedures |
|
|
278 | (10) |
|
|
278 | (3) |
|
|
281 | (1) |
|
|
282 | (3) |
|
Cable Placement and Routing |
|
|
285 | (3) |
|
|
288 | (1) |
|
|
289 | (1) |
|
|
290 | (3) |
Chapter 9 Disaster Recovery |
|
293 | (22) |
|
Disaster Recovery Principles |
|
|
294 | (4) |
|
|
294 | (1) |
|
|
295 | (2) |
|
|
297 | (1) |
|
|
298 | (11) |
|
|
299 | (5) |
|
|
304 | (1) |
|
Media and Restore Best Practices |
|
|
305 | (2) |
|
|
307 | (2) |
|
|
309 | (1) |
|
|
309 | (1) |
|
|
310 | (5) |
Chapter 10 Troubleshooting Hardware and Software Issues |
|
315 | (50) |
|
Troubleshooting Theory and Methodologies |
|
|
317 | (5) |
|
Identifying the Problem and Determining the Scope |
|
|
317 | (2) |
|
Establish a Theory of Probable Cause (Question the Obvious) |
|
|
319 | (1) |
|
Test the Theory to Determine Cause |
|
|
320 | (1) |
|
Establish a Plan of Action to Resolve the Problem and Notify Impacted Users |
|
|
320 | (1) |
|
Implement the Solution or Escalate as Appropriate |
|
|
320 | (1) |
|
Verify Full System Functionality and If Applicable Implement Preventative Measures |
|
|
321 | (1) |
|
Perform a Root Cause Analysis |
|
|
321 | (1) |
|
Document Findings, Actions and Outcomes Throughout the Process |
|
|
321 | (1) |
|
Troubleshooting Hardware Problems |
|
|
322 | (12) |
|
|
322 | (6) |
|
Causes of Common Problems |
|
|
328 | (3) |
|
|
331 | (2) |
|
|
333 | (1) |
|
Troubleshooting Software Problems |
|
|
334 | (26) |
|
|
334 | (9) |
|
|
343 | (5) |
|
|
348 | (12) |
|
|
360 | (1) |
|
|
360 | (1) |
|
|
361 | (4) |
Chapter 11 Troubleshooting Connectivity Issues |
|
365 | (46) |
|
Diagnosing Network Problems |
|
|
366 | (25) |
|
|
366 | (12) |
|
Causes of Common Problems |
|
|
378 | (6) |
|
|
384 | (7) |
|
Diagnosing Security Issues |
|
|
391 | (13) |
|
|
391 | (2) |
|
Causes of Common Problems |
|
|
393 | (6) |
|
|
399 | (5) |
|
|
404 | (1) |
|
|
405 | (1) |
|
|
406 | (5) |
Chapter 12 Troubleshooting Storage Issues |
|
411 | (32) |
|
Troubleshooting Storage Problems |
|
|
412 | (26) |
|
|
412 | (6) |
|
Causes of Common Problems |
|
|
418 | (8) |
|
|
426 | (12) |
|
|
438 | (1) |
|
|
439 | (1) |
|
|
440 | (3) |
Appendix Answers to Review Questions |
|
443 | (20) |
|
Chapter 1: Server Hardware |
|
|
444 | (1) |
|
Chapter 2: Installing and Configuring Servers |
|
|
445 | (2) |
|
Chapter 3: Server Maintenance |
|
|
447 | (1) |
|
Chapter 4: Storage Technologies |
|
|
448 | (2) |
|
Chapter 5: Identifying Capacity and Fault Tolerance Requirements |
|
|
450 | (1) |
|
Chapter 6: Securing the Server |
|
|
451 | (2) |
|
Chapter 7: Securing Server Data and Network Access |
|
|
453 | (2) |
|
|
455 | (1) |
|
Chapter 9: Disaster Recovery |
|
|
456 | (2) |
|
Chapter 10: Troubleshooting Hardware and Software Issues |
|
|
458 | (2) |
|
Chapter 11: Troubleshooting Connectivity Issues |
|
|
460 | (1) |
|
Chapter 12: Troubleshooting Storage Issues |
|
|
461 | (2) |
Index |
|
463 | |