Introduction |
|
xxiii | |
Assessment Test |
|
liv | |
Answers to Assessment Test |
|
lxi | |
|
Chapter 1 Server Hardware |
|
|
1 | (62) |
|
|
3 | (11) |
|
|
3 | (1) |
|
|
3 | (2) |
|
|
5 | (9) |
|
|
14 | (12) |
|
|
15 | (3) |
|
|
18 | (5) |
|
|
23 | (2) |
|
|
25 | (1) |
|
|
26 | (31) |
|
|
26 | (1) |
|
|
27 | (3) |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
31 | (1) |
|
Small Form-Factor Pluggable (SFP) |
|
|
32 | (1) |
|
|
32 | (1) |
|
Quad Small Form-Factor Pluggable (QSFP) |
|
|
33 | (1) |
|
|
33 | (2) |
|
|
35 | (7) |
|
|
42 | (13) |
|
|
55 | (2) |
|
|
57 | (1) |
|
|
57 | (2) |
|
|
59 | (4) |
|
Chapter 2 Installing and Configuring Servers |
|
|
63 | (52) |
|
Installing Server Operating Systems |
|
|
67 | (9) |
|
Minimum Operating System (OS) Requirements |
|
|
67 | (1) |
|
Hardware Compatibility List (HCL) |
|
|
68 | (1) |
|
|
68 | (5) |
|
Partition and Volume Types |
|
|
73 | (2) |
|
|
75 | (1) |
|
Configuring and Maintaining Server Functions and Features |
|
|
76 | (22) |
|
Server Roles Requirements |
|
|
77 | (19) |
|
Data Migration and Transfer |
|
|
96 | (1) |
|
Administrative Interfaces |
|
|
97 | (1) |
|
The Purpose and Operation of Virtualization |
|
|
98 | (13) |
|
|
98 | (1) |
|
|
99 | (4) |
|
Resource Allocation and Provisioning |
|
|
103 | (5) |
|
Management Interfaces for Virtual Machines |
|
|
108 | (2) |
|
|
110 | (1) |
|
|
111 | (1) |
|
|
111 | (1) |
|
|
112 | (3) |
|
Chapter 3 Server Maintenance |
|
|
115 | (28) |
|
Given a Scenario, Perform Server Hardware Maintenance |
|
|
117 | (15) |
|
|
117 | (5) |
|
Local Hardware Administration |
|
|
122 | (3) |
|
|
125 | (1) |
|
|
126 | (3) |
|
|
129 | (2) |
|
Basic Input/Output System (BIOS)AJnified Extensible Firmware Interface (UEFI) |
|
|
131 | (1) |
|
Explain Licensing Concepts |
|
|
132 | (5) |
|
|
132 | (2) |
|
|
134 | (1) |
|
|
135 | (1) |
|
License vs. Maintenance and Support |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
136 | (1) |
|
|
136 | (1) |
|
|
137 | (1) |
|
|
137 | (1) |
|
|
138 | (5) |
|
Chapter 4 Storage Technologies and Asset Management |
|
|
143 | (38) |
|
Given a Scenario, Deploy and Manage Storage |
|
|
146 | (19) |
|
|
146 | (5) |
|
|
151 | (2) |
|
|
153 | (4) |
|
|
157 | (4) |
|
|
161 | (4) |
|
Explain the Importance of Asset Management and Documentation |
|
|
165 | (10) |
|
|
166 | (3) |
|
|
169 | (6) |
|
|
175 | (1) |
|
Secure Storage of Sensitive Documentation |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
177 | (4) |
|
Chapter 5 Identifying Fault Tolerance Requirements |
|
|
181 | (16) |
|
|
182 | (2) |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
183 | (1) |
|
Proper Patching Procedures |
|
|
184 | (1) |
|
|
184 | (1) |
|
|
184 | (1) |
|
Server-Level Redundancy vs. Component Redundancy |
|
|
185 | (1) |
|
Redundant Server Network Infrastructure |
|
|
185 | (6) |
|
|
185 | (1) |
|
Network Interface Card (NIC) Teaming and Redundancy |
|
|
186 | (5) |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
192 | (5) |
|
Chapter 6 Securing the Server |
|
|
197 | (46) |
|
Summarize Physical Security Concepts |
|
|
200 | (10) |
|
|
200 | (6) |
|
|
206 | (4) |
|
Explain Data Security Risks and Mitigation Strategies |
|
|
210 | (16) |
|
|
210 | (13) |
|
|
223 | (3) |
|
Given a Scenario, Apply Server Hardening Methods |
|
|
226 | (12) |
|
|
226 | (2) |
|
|
228 | (1) |
|
|
228 | (2) |
|
|
230 | (8) |
|
|
238 | (1) |
|
|
238 | (1) |
|
|
239 | (4) |
|
Chapter 7 Securing Server Data and Network Access |
|
|
243 | (32) |
|
Summarize Data Security Concepts |
|
|
246 | (6) |
|
|
246 | (2) |
|
|
248 | (1) |
|
|
248 | (1) |
|
|
249 | (1) |
|
|
249 | (1) |
|
|
250 | (1) |
|
|
251 | (1) |
|
|
251 | (1) |
|
Explain Important Concepts Pertaining to Identity and Access Management for Server Administration |
|
|
252 | (13) |
|
|
252 | (4) |
|
Permissions and Access Controls |
|
|
256 | (5) |
|
|
261 | (3) |
|
Multifactor Authentication (MFA) |
|
|
264 | (1) |
|
|
265 | (1) |
|
Summarize Proper Server Decommissioning Concepts |
|
|
265 | (4) |
|
Proper Removal Procedures |
|
|
265 | (1) |
|
|
266 | (2) |
|
Media Retention Requirements |
|
|
268 | (1) |
|
|
268 | (1) |
|
|
268 | (1) |
|
|
269 | (1) |
|
|
269 | (1) |
|
|
270 | (5) |
|
Chapter 8 Networking and Scripting |
|
|
275 | (34) |
|
Given a Scenario, Configure Servers to Use Network Infrastructure Services |
|
|
277 | (20) |
|
|
277 | (1) |
|
Virtual Local Area Network (VLAN) |
|
|
277 | (2) |
|
|
279 | (1) |
|
|
279 | (6) |
|
|
285 | (2) |
|
|
287 | (6) |
|
|
293 | (3) |
|
|
296 | (1) |
|
Summarize Scripting Basics for Server Administration |
|
|
297 | (5) |
|
|
297 | (2) |
|
|
299 | (1) |
|
|
299 | (1) |
|
|
299 | (2) |
|
|
301 | (1) |
|
Common Server Administration Scripting Tasks |
|
|
301 | (1) |
|
|
302 | (1) |
|
|
303 | (1) |
|
|
304 | (5) |
|
Chapter 9 Disaster Recovery |
|
|
309 | (20) |
|
Explain the Importance of Backups and Restores |
|
|
311 | (8) |
|
|
311 | (2) |
|
|
313 | (1) |
|
|
313 | (2) |
|
|
315 | (2) |
|
File-Level vs. System-State Backup |
|
|
317 | (1) |
|
|
317 | (1) |
|
|
318 | (1) |
|
Media Inventory Before Restoration |
|
|
319 | (1) |
|
Explain the Importance of Disaster Recovery |
|
|
319 | (4) |
|
|
319 | (1) |
|
|
320 | (3) |
|
|
323 | (1) |
|
|
323 | (1) |
|
|
324 | (1) |
|
|
325 | (4) |
|
Chapter 10 Troubleshooting Hardware and Software Issues |
|
|
329 | (64) |
|
Explain the Troubleshooting Theory and Methodology |
|
|
334 | (5) |
|
Identify the Problem and Determine the Scope |
|
|
334 | (2) |
|
Establish a Theory of Probable Cause (Question the Obvious) |
|
|
336 | (1) |
|
Test the Theory to Determine the Cause |
|
|
337 | (1) |
|
Establish a Plan of Action to Resolve the Problem |
|
|
337 | (1) |
|
Implement the Solution or Escalate |
|
|
338 | (1) |
|
Verify Full System Functionality and, if Applicable, Implement Preventive Measures |
|
|
338 | (1) |
|
Perform a Root Cause Analysis |
|
|
338 | (1) |
|
Document Findings, Actions, and Outcomes Throughout the Process |
|
|
339 | (1) |
|
Given a Scenario, Troubleshoot Common Hardware Failures |
|
|
339 | (24) |
|
|
339 | (12) |
|
Causes of Common Problems |
|
|
351 | (8) |
|
|
359 | (4) |
|
Given a Scenario, Troubleshoot Common OS and Software Problems |
|
|
363 | (24) |
|
|
363 | (6) |
|
Causes of Common Problems |
|
|
369 | (5) |
|
OS and Software Tools and Techniques |
|
|
374 | (13) |
|
|
387 | (1) |
|
|
387 | (2) |
|
|
389 | (4) |
|
Chapter 11 Troubleshooting Network Connectivity and Security Issues |
|
|
393 | (52) |
|
Given a Scenario, Troubleshoot Network Connectivity Issues |
|
|
396 | (23) |
|
|
396 | (6) |
|
Causes of Common Problems |
|
|
402 | (9) |
|
|
411 | (8) |
|
Given a Scenario, Troubleshoot Security Problems |
|
|
419 | (20) |
|
|
420 | (1) |
|
Causes of Common Problems |
|
|
421 | (12) |
|
|
433 | (6) |
|
|
439 | (1) |
|
|
440 | (1) |
|
|
441 | (4) |
|
Chapter 12 Troubleshooting Storage Issues |
|
|
445 | (50) |
|
Given a Scenario, Troubleshoot Storage Problems |
|
|
447 | (42) |
|
|
447 | (11) |
|
Causes of Common Problems |
|
|
458 | (9) |
|
|
467 | (22) |
|
|
489 | (1) |
|
|
489 | (1) |
|
|
490 | (5) |
|
Appendix Answers to Review Questions |
|
|
495 | (22) |
|
Chapter 1 Server Hardware |
|
|
496 | (1) |
|
Chapter 2 Installing and Configuring Servers |
|
|
497 | (2) |
|
Chapter 3 Server Maintenance |
|
|
499 | (2) |
|
Chapter 4 Storage Technologies and Asset Management |
|
|
501 | (1) |
|
Chapter 5 Identifying Fault Tolerance Requirements |
|
|
502 | (2) |
|
Chapter 6 Securing the Server |
|
|
504 | (2) |
|
Chapter 7 Securing Server Data and Network Access |
|
|
506 | (2) |
|
Chapter 8 Networking and Scripting |
|
|
508 | (1) |
|
Chapter 9 Disaster Recovery |
|
|
509 | (2) |
|
Chapter 10 Troubleshooting Hardware and Software Issues |
|
|
511 | (2) |
|
Chapter 11 Troubleshooting Network Connectivity and Security Issues |
|
|
513 | (2) |
|
Chapter 12 Troubleshooting Storage Issues |
|
|
515 | (2) |
Index |
|
517 | |