1.0 System Management

2.0 Security

3.0 Scripting, Containers, and Automation

4.0 Troubleshooting

UpComing Classes

Full Course

CompTIA Server+ Certification Exam Objectives

About the Exam

Candidates are encouraged to use this document to help prepare for the CompTIA Server+ (SK0-005) certification exam. With the end goal of proactively defending and continuously improving the security of an organization, Server+ will verify the successful candidate has the knowledge and skills required to:
•    Install, configure, and manage server hardware and server operating systems
•    Implement proper server hardening and security controls
•    Successfully troubleshoot common server problems
•    Demonstrate an understanding of key disaster recovery, high-availability, and backup concepts This is equivalent to two years of hands-on experience working in a server environment.
These content examples are meant to clarify the test objectives and should not be construed as a comprehensive listing of all the content of this examination.
CompTIA exams result from subject matter expert workshops and industry-wide survey results regarding the skills and knowledge required of an IT professional.
CompTIA Certifications, LLC is not affiliated with and does not authorize, endorse or condone utilizing any content provided by unauthorized third-party training sites (aka “brain dumps”). Individuals who utilize such materials in preparation for any CompTIA examination will have their certifications revoked and be suspended from future testing in accordance with the CompTIA Candidate Agreement. In an effort to more clearly communicate CompTIA’s exam policies on use of unauthorized study materials, CompTIA directs
all certification candidates to the CompTIA Certification Exam Policies. Please review all CompTIA policies before beginning the study process for any CompTIA exam. Candidates will be required to abide by the CompTIA Candidate Agreement. If a candidate has a question as to whether study materials are considered unauthorized (aka “brain dumps”), he/she should contact CompTIA at to confirm.
The lists of examples provided in bulleted format are not exhaustive lists. Other examples of technologies, processes, or tasks pertaining to each objective may also be included on the exam although not listed or covered in this objectives document. CompTIA is constantly reviewing the content of our exams and updating test questions to be sure our exams are current and the security of the questions is protected. When necessary, we will publish updated exams based on testing exam objectives. Please know that all related exam preparation materials will still be valid.

Required exam    SK0-005
Number of questions    90
Types of questions    Multiple choice and performance-based Length of test    90 minutes
Recommended experience • Two years of hands-on experience working in a server environment
•    CompTIA A+ certified or equivalent knowledge
Passing score    750

The table below lists the domains measured by this examination and the extent to which they are represented.

1.0 Server Hardware Installation and Management    18%
2.0 Server Administration    30%
3.0 Security and Disaster Recovery    24%
4.0 Troubleshooting    28%
Total    100%

1.0 Server Hardware Installation and Management
Given a scenario, install physical hardware.

•    Racking
-    Enclosure sizes
-    Unit sizes
- 1U, 2U, 3U, etc.
-    Rack layout
-    Cooling management
-    Safety
-    Proper lifting techniques
-    Rack balancing
-    Floor load limitations
-    Power distribution unit (PDU)
-    Keyboard-video-
mouse (KVM) placement
-    Rail kits
•    Power cabling
-    Redundant power
-    Uninterruptible power supply (UPS)
-    Separate circuits
-    Separate providers
-    Power connector types
-    Cable management
•    Network cabling
-    Redundant networking
-    Twisted pair
-    Fiber
-    SC
-    LC
-    Single mode
-    Multimode
-    Gigabit
-    10 GigE
-    Small form factor pluggable (SFP)
-    SFP+
-    Quad small form factor pluggable (QSFP)
-    Cable management
•    Server chassis types
-    Tower
-    Rack mount
-    Blade enclosure
•    Server components
-    Hardware compatibility list (HCL)
-    Central processing unit (CPU)
-    Graphics processing unit (GPU)
-    Memory
-    Bus types
-    Interface types
-    Expansion cards

Given a scenario, deploy and manage storage.

•    RAID levels and types
- 0
- 1
- 5
- 6
- 10
-    Just a bunch of disks (JBOD)
-    Hardware vs. software
•    Capacity planning
•    Hard drive media types
-    Solid state drive (SSD)
-    Wear factors
-    Read intensive
-    Write intensive
-    Hard disk drive (HDD)
-    Rotations per minute (RPM)
- 15,000
- 10,000
- 7,200
-    Hybrid
•    Interface types
-    Serial attached SCSI (SAS)
-    Serial ATA (SATA)
-    Peripheral component interconnect (PCI)
-    External serial advanced technology attachment (eSATA)
-    Universal serial bus (USB)
-    Secure digital (SD)
•    Shared storage
-    Network attached storage (NAS)
-    Network file system (NFS)
-    Common Internet file system (CIFS)
-    Storage area network (SAN)
-    Internet small
computer systems interface (iSCSI)
-    Fibre Channel
-    Fibre Channel over Ethernet (FCoE)
1.0 Server Hardware Installation and Management  

Given a scenario, perform server hardware maintenance.

•    Out-of-band management
-    Remote drive access
-    Remote console access
-    Remote power on/off
-    Internet protocol keyboard- video-mouse (IP KVM)
•    Local hardware administration
-    Keyboard-video-mouse (KVM)
-    Crash cart
-    Virtual administration console
-    Serial connectivity
-    Console connections
•    Components
-    Firmware upgrades
•    Drives
•    Hot-swappable hardware
-    Drives
-    Cages
-    Cards
-    Power supplies
-    Fans
•    Basic input/output system (BIOS)/Unified Extensible Firmware Interface (UEFI)

2.0 Server Administration
Given a scenario, install server operating systems.

•    Minimum operating system (OS) requirements
•    Hardware compatibility list (HCL)
•    Installations
-    Graphical user interface (GUI)
-    Core
-    Bare metal
-    Virtualized
-    Remote
-    Slip streamed/unattended
-    Scripted installations
-    Additional drivers
-    Additional applications and utilities
-    Patches
-    Media installation type
-    Network
-    Optical
-    Universal serial bus (USB)
-    Embedded
-    Imaging
-    Cloning
-    Virtual machine (VM) cloning
-    Physical clones
-    Template deployment
-    Physical to virtual (P2V)
•    Partition and volume types
-    Global partition table (GPT) vs. master boot record (MBR)
-    Dynamic disk
-    Logical volume management (LVM)
•    File system types
-    ext4
-    New technology file system (NTFS)
-    VMware file system (VMFS)
-    Resilient file system (ReFS)
-    Z file system (ZFS)

Given a scenario, configure servers to use network infrastructure services.

•    IP configuration
•    Virtual local area network (VLAN)
•    Default gateways
•    Name resolution
-    Domain name service (DNS)
-    Fully qualified domain name (FQDN)
-    Hosts file
•    Addressing protocols
-    IPv4
-    Request for comments (RFC) 1918 address spaces
-    IPv6
•    Firewall
-    Ports
•    Static vs. dynamic
-    Dynamic host configuration protocol (DHCP)
-    Automatic private IP address (APIPA)
•    MAC addresses

Given a scenario, configure and maintain server functions and features.

•    Server roles requirements
-    Print
-    Database
-    File
-    Web
-    Application
-    Messaging
-    Baselining
-    Documentation
-    Performance metrics
•    Directory connectivity
•    Storage management
-    Formatting
-    Connectivity
-    Provisioning
-    Partitioning
-    Page/swap/scratch location and size
-    Disk quotas
-    Compression
-    Deduplication
•    Monitoring
-    Uptime
-    Thresholds
-    Performance
-    Memory
-    Disk
-    Input output operations per second (IOPS)
-    Capacity vs. utilization
-    Network
-    Central processing unit (CPU)
-    Event logs
-    Configuration
-    Shipping
-    Alerting
-    Reporting
-    Retention
-    Rotation
•    Data migration and transfer
-    Infiltration
-    Exfiltration
-    Disparate OS data transfer
-    Robocopy
-    File transfer
-    Fast copy
-    Secure copy protocol (SCP)
•    Administrative interfaces
-    Console
-    Remote desktop
-    Secure shell (SSH)
-    Web interface

Explain the key concepts of high availability for servers.

•    Clustering
-    Active-active
-    Active-passive
-    Failover
-    Failback
-    Proper patching procedures
-    Heartbeat
•    Fault tolerance
-    Server-level redundancy vs. component redundancy
•    Redundant server network infrastructure
-    Load balancing
-    Software vs. hardware
-    Round robin
- Most recently used (MRU)
-    Network interface card (NIC) teaming and redundancy
-    Failover
-    Link aggregation

Summarize the purpose and operation of virtualization.

•    Host vs. guest
•    Virtual networking
-    Direct access (bridged)
-    Network address translation (NAT)
-    vNICs
-    Virtual switches
•    Resource allocation and provisioning
-    CPU
-    Memory
-    Disk
-    NIC
-    Overprovisioning
-    Scalability
•    Management interfaces for virtual machines
•    Cloud models
-    Public
-    Private
-    Hybrid

Summarize scripting basics for server administration.

•    Script types
-    Bash
-    Batch
-    PowerShell
-    Virtual basic script (VBS)
•    Environment variables
•    Comment syntax
•    Basic script constructs
-    Loops
-    Variables
-    Conditionals
-    Comparators
•    Basic data types
-    Integers
-    Strings
-    Arrays
•    Common server administration scripting tasks
-    Startup
-    Shut down
-    Service
-    Login
-    Account creation
-    Bootstrap

Explain the importance of asset management and documentation.

•    Asset management
-    Labeling
-    Warranty
-    Leased vs. owned devices
-    Life-cycle management
-    Procurement
-    Usage
-    End of life
-    Disposal/recycling
-    Inventory
-    Make
-    Model
-    Serial number
-    Asset tag
•    Documentation management
-    Updates
-    Service manuals
-    Architecture diagrams
-    Infrastructure diagrams
-    Workflow diagrams
-    Recovery processes
-    Baselines
-    Change management
-    Server configurations
-    Company policies and procedures
-    Business impact analysis (BIA)
-    Mean time between failure (MTBF)
-    Mean time to recover (MTTR)
-    Recovery point objective (RPO)
-    Recovery time objective (RTO)
-    Service level agreement (SLA)
-    Uptime requirements
•    Document availability
•    Secure storage of sensitive documentation


Explain licensing concepts.

•    Models
-    Per-instance
-    Per-concurrent user
-    Per-server
-    Per-socket
-    Per-core
-    Site-based
-    Physical vs. virtual
-    Node-locked
-    Signatures
•    Open source
•    Subscription
•    License vs. maintenance and support
•    Volume licensing
•    License count validation
-    True up
•    Version compatibility
-    Backward compatible
-    Forward compatible

3.0 Security and Disaster Recovery

Summarize data security concepts.

•    Encryption paradigms
-    Data at rest
-    Data in transit
•    Retention policies
•    Data storage
-    Physical location storage
-    Off-site vs. on-site
•    UEFI/BIOS passwords
•    Bootloader passwords
•    Business impact
-    Data value prioritization
-    Life-cycle management
-    Cost of security vs. risk and/or replacement

Summarize physical security concepts.

•    Physical access controls
-    Bollards
-    Architectural reinforcements
-    Signal blocking
-    Reflective glass
-    Datacenter camouflage
-    Fencing
-    Security guards
-    Security cameras
-    Locks
-    Biometric
-    Radio frequency identification (RFID)
-    Card readers
-    Mantraps
-    Safes
•    Environmental controls
-    Fire suppression
-    Heating, ventilation, and cooling (HVAC)
-    Sensors

Explain important concepts pertaining to identity and access management for server administration.

•    User accounts
•    User groups
•    Password policies
-    Length
-    Lockout
-    Enforcement
•    Permissions and access controls
-    Role-based
-    Rule-based
-    Scope based
-    Segregation of duties
-    Delegation
•    Auditing
-    User activity
-    Logins
-    Group memberships
-    Deletions
•    Multifactor authentication (MFA)
-    Something you know
-    Something you have
-    Something you are
•    Single sign-on (SSO)

Explain data security risks and mitigation strategies.

•    Security risks
-    Hardware failure
-    Malware
-    Data corruption
-    Insider threats
-    Theft
-    Data loss prevention (DLP)
-    Unwanted duplication
-    Unwanted publication
-    Unwanted access methods
-    Backdoor
-    Social engineering
-    Breaches
-    Identification
-    Disclosure
•    Mitigation strategies
-    Data monitoring
-    Log analysis
-    Security information and event management (SIEM)
-    Two-person integrity
-    Split encryption keys tokens
-    Separation of roles
-    Regulatory constraints
-    Governmental
-    Individually privileged information
-    Personally identifiable information (PII)
-    Payment Card Industry Data Security Standard (PCI DSS)
-    Legal considerations
-    Data retention
-    Subpoenas

Given a scenario, apply server hardening methods.

•    OS hardening
-    Disable unused services
-    Close unneeded ports
-    Install only required software
-    Apply driver updates
-    Apply OS updates
-    Firewall configuration
•    Application hardening
-    Install latest patches
-    Disable unneeded services, roles, or features
•    Host security
-    Antivirus
-    Anti-malware
-    Host intrusion detection system (HIDS)/Host intrusion prevention system (HIPS)
•    Hardware hardening
-    Disable unneeded hardware
-    Disable unneeded physical ports, devices, or functions
-    Set BIOS password
-    Set boot order
•    Patching
-    Testing
-    Deployment
-    Change management

Summarize proper server decommissioning concepts.

•    Proper removal procedures
-    Company policies
-    Verify non-utilization
-    Documentation
-    Asset management
-    Change management
•    Media destruction
-    Disk wiping
-    Physical
-    Degaussing
-    Shredding
-    Crushing
-    Incineration
-    Purposes for media destruction
•    Media retention requirements
•    Cable remediation
-    Power
-    Networking
•    Electronics recycling
-    Internal vs. external
-    Repurposing

Explain the importance of backups and restores.

•    Backup methods
-    Full
-    Synthetic full
-    Incremental
-    Differential
-    Archive
-    Open file
-    Snapshot
•    Backup frequency
•    Media rotation
•    Backup media types
-    Tape
-    Cloud
-    Disk
-    Print
•    File-level vs. system-state backup
•    Restore methods
-    Overwrite
-    Side by side
-    Alternate location path
•    Backup validation
-    Media integrity
-    Equipment
-    Regular testing intervals
•    Media inventory before restoration

Explain the importance of disaster recovery.

•    Site types
-    Hot site
-    Cold site
-    Warm site
-    Cloud
-    Separate geographic locations
•    Replication
-    Constant
-    Background
-    Synchronous vs. asynchronous
-    Application consistent
-    File locking
-    Mirroring
-    Bidirectional
•    Testing
-    Tabletops
-    Live failover
-    Simulated failover
-    Production vs. non-production

4.0 Troubleshooting
Explain the troubleshooting theory and methodology.

•    Identify the problem and determine the scope.
-    Question users/stakeholders and identify changes to
the server/environment.
-    Collect additional documentation/logs.
-    If possible, replicate the problem as appropriate.
-    If possible, perform backups before making changes.
-    Escalate, if necessary.
•    Establish a theory of probable cause (question the obvious).
-    Determine whether there is
a common element or symptom causing multiple problems.
•    Test the theory to determine the cause.
-    Once the theory is confirmed, determine the next steps to resolve the problem.
-    If the theory is not confirmed, establish a new theory.
•    Establish a plan of action to resolve the problem.
-    Notify impacted users.

•    Implement the solution or escalate.
-    Make one change at a time and test/confirm the change has resolved the problem.
-    If the problem is not resolved, reverse the change, if appropriate, and implement a new change.
•    Verify full system functionality and, if applicable, implement preventive measures.
•    Perform a root cause analysis.
•    Document findings, actions, and outcomes throughout the process.

Given a scenario, troubleshoot common hardware failures.

•    Common problems
-    Predictive failures
-    Memory errors and failures
-    System crash
-    Blue screen
-    Purple screen
-    Memory dump
-    Utilization
-    Power-on self-test (POST) errors
-    Random lockups
-    Kernel panic
-    Complementary metal-oxide- semiconductor (CMOS) battery failure
-    System lockups
-    Random crashes
-    Fault and device indication
-    Visual indicators
-    Light-emitting diode (LED)
-    Liquid crystal display (LCD) panel readouts
-    Auditory or olfactory cues
-    POST codes
-    Misallocated virtual resources
•    Causes of common problems
-    Technical
-    Power supply fault
-    Malfunctioning fans
-    Improperly seated heat sink
-    Improperly seated cards
-    Incompatibility of components
-    Cooling failures
-    Backplane failure
-    Firmware incompatibility
-    CPU or GPU overheating
-    Environmental
-    Dust
-    Humidity
-    Temperature
•    Tools and techniques
-    Event logs
-    Firmware upgrades or downgrades
-    Hardware diagnostics
-    Compressed air
-    Electrostatic discharge (ESD) equipment
-    Reseating or replacing components and/or cables

Given a scenario, troubleshoot storage problems.

•    Common problems
-    Boot errors
-    Sector block errors
-    Cache battery failure
-    Read/write errors
-    Failed drives
-    Page/swap/scratch file or partition
-    Partition errors
-    Slow file access
-    OS not found
-    Unsuccessful backup
-    Unable to mount the device
-    Drive not available
-    Cannot access logical drive
-    Data corruption
-    Slow I/O performance
-    Restore failure
-    Cache failure
-    Multiple drive failure
•    Causes of common problems
-    Disk space utilization
- Insufficient disk space
-    Misconfigured RAID
-    Media failure
-    Drive failure
-    Controller failure
-    Hot bus adapter (HBA) failure
-    Loose connectors
-    Cable problems
-    Misconfiguration
-    Corrupt boot sector
-    Corrupt filesystem table
-    Array rebuild
-    Improper disk partition
-    Bad sectors
-    Cache battery failure
-    Cache turned off
-    Insufficient space
-    Improper RAID configuration
-    Mismatched drives
-    Backplane failure
•    Tools and techniques
-    Partitioning tools
-    Disk management
-    RAID and array management
-    System logs
-    Disk mounting commands
-    net use
-    mount
-    Monitoring tools
-    Visual inspections
-    Auditory inspections


Given a scenario, troubleshoot common OS and software problems.

•    Common problems
-    Unable to log on
-    Unable to access resources
-    Unable to access files
-    System file corruption
-    End of life/end of support
-    Slow performance
-    Cannot write to system logs
-    Service failures
-    System or application hanging
-    Freezing
-    Patch update failure
•    Causes of common problems
-    Incompatible drivers/modules
-    Improperly applied patches
-    Unstable drivers or software
-    Server not joined to domain
-    Clock skew
-    Memory leaks
-    Buffer overrun
-    Incompatibility
-    Insecure dependencies
-    Version management
-    Architecture
-    Update failures
-    Missing updates
-    Missing dependencies
-    Downstream failures due to updates
-    Inappropriate application- level permissions
-    Improper CPU affinity and priority
•    OS and software tools and techniques
-    Patching
-    Upgrades
-    Downgrades
-    Package management
-    Recovery
-    Boot options
-    Safe mode
-    Single user mode
-    Reload OS
-    Snapshots
-    Proper privilege escalations
-    runas/Run As
-    sudo
-    su
-    Scheduled reboots
-    Software firewalls
-    Adding or removing ports
-    Zones
-    Clocks
-    Network time protocol (NTP)
-    System time
-    Services and processes
-    Starting
-    Stopping
-    Status identification
-    Dependencies
-    Configuration management
-    System center configuration manager (SCCM)
-    Puppet/Chef/Ansible
-    Group Policy Object (GPO)
-    Hardware compatibility list (HCL)

Given a scenario, troubleshoot network connectivity issues.

•    Common problems
-    Lack of Internet connectivity
-    Resource unavailable
-    Receiving incorrect DHCP information
-    Non-functional or unreachable
-    Destination host unreachable
-    Unknown host
-    Unable to reach remote subnets
-    Failure of service provider
-    Cannot reach server by hostname/ fully qualified domain name (FQDN)
•    Causes of common problems
-    Improper IP configuration
-    IPv4 vs. IPv6 misconfigurations
-    Improper VLAN configuration
-    Network port security
-    Component failure
-    Incorrect OS route tables
-    Bad cables
-    Firewall (misconfiguration, hardware failure, software failure)
-    Misconfigured NIC
-    DNS and/or DHCP failure
-    DHCP server misconfigured
-    Misconfigured hosts file
•    Tools and techniques
-    Check link lights
-    Confirm power supply
-    Verify cable integrity
-    Check appropriate cable selection
-    Commands
- ipconfig
-    ip addr
-    ping
-    tracert
-    traceroute
-    nslookup
-    netstat
-    dig
-    telnet
-    nc
-    nbtstat
-    route


Given a scenario, troubleshoot security problems.

•    Common concerns
-    File integrity
-    Improper privilege escalation
-    Excessive access
-    Applications will not load
-    Cannot access network fileshares
-    Unable to open files
•    Causes of common problems
-    Open ports
-    Services
-    Active
-    Inactive
-    Orphan/zombie
-    Intrusion detection configurations
-    Anti-malware configurations
-    Improperly configured local/group policies
-    Improperly configured firewall rules
-    Misconfigured permissions
-    Virus infection
-    Malware
-    Rogue processes/services
-    Data loss prevention (DLP)
•    Security tools
-    Port scanners
-    Sniffers
-    Telnet clients
-    Anti-malware
-    Antivirus
-    File integrity
-    Checksums
-    Monitoring
-    Detection
-    Enforcement
-    User access controls
-    SELinux
-    User account control (UAC)

CompTIA Server+ (SK0-005) Acronym List

The following is a list of acronyms that appear on the CompTIA Server+ exam. Candidates are encouraged to review the complete list and attain a working knowledge of all listed acronyms as a part of a comprehensive exam preparation program.

ACL    Access Control List    GPU    Graphics Processing Unit
AD    Active Directory    GUI    Graphical User Interface
APIPA    Automatic Private IP Address    HBA    Host Bus Adapter
BCP    Business Continuity Plan    HCL    Hardware Compatibility List
BIA    Business Impact Analysis    HID    Human Interface Device
BIOS    Basic Input/Output System    HIDS    Host Intrusion Detection System
BSOD    Blue Screen of Death    HIPS    Host Intrusion Prevention System
CIDR    Classless Inter-Domain Routing    HTTP    Hyper Text Transport Protocol
CIFS    Common Internet File System    HTTPS    Secure Hyper Text Transport Protocol
CIMC    Cisco Integrated Management Controller    HVAC    Heating Ventilation and Air Conditioning
CLI    Command Line Interface    IDF    Intermediate Distribution Frame
CMOS    Complementary Metal-Oxide-Semiconductor    iDRAC    Integrated Dell Remote Access Control
COOP    Continuity of Operations    IDS    Intrusion Detection System
CPU    Central Processing Unit    IIS    Internet Information Services
CRU    Customer Replaceable Unit    iLO    Integrated Lights Out
DAS    Direct Attached Storage    IMAP4    Internet Mail Access Protocol
DC    Domain Controller    Intel-VT    Intel Virtualization Technology
DDoS    Distributed Denial of Service    IOPS    Input Output Operations per Second
DHCP    Dynamic Host Configuration Protocol    IP    Internet Protocol
DLP    Data Loss Prevention    IP KVM    Internet Protocol Keyboard-Video-Mouse
DLT    Digital Linear Tape    IPMI    Intelligent Platform Management Interface
DMZ    Demilitarized Zone    IPS    Intrusion Prevention System
DNS    Domain Name Service    IPSEC    Internet Protocol Security
DR    Disaster Recovery    IPv6    Internet Protocol version 6
ECC    Error Checking and Correction    iSCSI    Internetworking Small Computer System Interface
EFS    Encrypting File System    ISO    International Organization for Standardization
eSATA    External Serial Advanced Technology Attachment    JBOD    Just a Bunch of Disks
ESD    Electrostatic Discharge    KVM    Keyboard-Video-Mouse
FAT    File Allocation Table    LAN    Local Area Network
FCoE    Fibre Channel over Ethernet    LC    Lucent Connector/Little Connector
FQDN    Fully Qualified Domain Name    LCD    Liquid Crystal Display
FRU    Field Replaceable Unit    LDAP    Lightweight Directory Access Protocol
FTP    File Transfer Protocol    LED    Light Emitting Diode
FTPS    File Transfer Protocol over SSL    LTO    Linear Tape-Open
GFS    Grandfather Father Son    LUN    Logical Unit Number
GPO    Group Policy Object    LVM    Logical Volume Management
GPT    GUID Partition Table    MAC    Media Access Control
MBR    Master Boot Record    SAS    Serial Attached SCSI
MDF    Main Distribution Frame    SATA    Serial ATA
MFA    Multifactor Authentication    SC    Standard Connector
MIB    Management Information Base    SCCM    System Center Configuration Management
MMC    Microsoft Management Console    SCP    Secure Copy Protocol
MRU    Most Recently Used    SCSI    Small Computer System Interface
MTBF    Mean Time Between Failure    SD    Secure Digital
MTTR    Mean Time to Recover    SELinux    Security Enhanced Linux
NAC    Network Access Control    SFP    Small Form Factor Pluggable
NAS    Network Attached Storage    SFTP    Secure File Transfer Protocol
NAT    Network Address Translation    SLA    Service Level Agreement
NetBIOS    Network Basic Input Output System    SMTP    Simple Mail Transport Protocol
NFS    Network File System    SNMP    Simple Network Management Protocol
NIC    Network Interface Card    SQL    Structured Query Language
NIDS    Network Intrusion Detection System    SSD    Solid State Drive
NIST    National Institute of Standards and Technology    SSH    Secure Shell
NLB    Network Load Balancing    SSL    Secure Sockets Layer
NOS    Network Operating System    SSO    Single Sign-On
NTFS    New Technology File System    ST    Straight Tip
NTP    Network Time Protocol    TACACS    Terminal Access Controller Access Control System
OEM    Original Equipment Manufacturer    TCP    Transmission Control Protocol
OS    Operating System    TCP/IP    Transmission Control Protocol/Internet Protocol
OTP    One-Time Password    TFTP    Trivial File Transfer Protocol
OU    Organizational Units    TLS    Transport Layer Security
P2V    Physical to Virtual    UAC    User Account Control
PAT    Port Address Translation    UDP    User Datagram Protocol
PCI    Peripheral Component Interconnect    UEFI    Unified Extensible Firmware Interface
PCI DSS    Payment Card Industry Data Security Standard    UID    Unit Identification
PCIe    Peripheral Component Interconnect Express    UPS    Uninterruptible Power Supply
PCI-X    Peripheral Component Interconnect Extended    URL    Universal/Uniform Resource Locator
PDU    Power Distribution Unit    USB    Universal Serial Bus
PII    Personally Identifiable Information    UUID    Universal Unique Identifier
PKI    Public Key Infrastructure    VBS    Visual Basic Script
POST    Power on Self-Test    VLAN    Virtual Local Area Network
PSU    Power Supply Unit    VM    Virtual Machine
PXE    Preboot Execution Environment    VMFS    VMWare File System
QSFP    Quad-Small Form Factor Pluggable    VNC    Virtual Network Computing
RADIUS    Remote Authentication Dial-in User Service    vNIC    Virtual Network Interface Card
RAID    Redundant Array of    VoIP    Voice over IP
    Inexpensive/Integrated Disks/Drives    VPN    Virtual Private Network
RAM    Random Access Memory    VSS    Volume Shadow Service
RAS    Remote Access Server    VT    Virtualization Technology
RDP    Remote Desktop Protocol    WDS    Windows Deployment Services
ReFS    Resilient File System    WINS    Windows Internet Naming Service
RFC    Request for Comments    WMI    Windows Management Instrumentation
RFID    Radio Frequency Identification    WOL    Wake on LAN
RIS    Remote Installation Service    WSUS    Windows Software Update Services
RJ45    Registered Jack 45    WWNN    World Wide Node Name
RPM    Rotations per Minute    WWPN    World Wide Port Name
RPO    Recovery Point Objective    XD    Execute Disable
RTO    Recovery Time Objective    ZFS    Z File System
SAN    Storage Area Network        

Server+ Proposed Hardware and Software List

CompTIA has included this sample list of hardware and software to assist candidates as they prepare for the Server+ exam. This list may also be helpful for training companies that wish to create a lab component for their training offering. The bulleted lists below each topic are samples and are not exhaustive.

•    Computer capable of virtualization
•    Cables
•    USB flash drive
•    KVM*
•    Rack*
•    UPS*
•    Switch*
•    Storage device*

*Ideal, but not necessary for lab setup
•    Server operating system
•    Virtualization software
•    Antivirus/anti-malware
© 2019 CompTIA Properties, LLC, used under license by CompTIA Certifications, LLC. All rights reserved. All certification programs and education related to such programs are operated exclusively by CompTIA Certifications, LLC. CompTIA is a registered trademark of CompTIA Properties, LLC in the U.S. and internationally. Other brands and company names mentioned herein may be trademarks or service marks of CompTIA Properties, LLC or of their respective owners. Reproduction or dissemination prohibited without written consent of CompTIA Properties, LLC. Printed in the U.S. 06885-Jul2019


Back to top