CompTIA Server+ (SK0-005)
1.0 Server Hardware Installation and Management
2.0 Server Administration
3.0 Security and Disaster Recovery
4.0 Troubleshooting
UpComing Classes
Full Course
CompTIA Server+ Certification Exam Objectives
EXAM NUMBER: SK0-005
About the Exam
Candidates are encouraged to use this document to help prepare for the CompTIA Server+ (SK0-005) certification exam. With the end goal of proactively defending and continuously improving the security of an organization, Server+ will verify the successful candidate has the knowledge and skills required to:
• Install, configure, and manage server hardware and server operating systems
• Implement proper server hardening and security controls
• Successfully troubleshoot common server problems
• Demonstrate an understanding of key disaster recovery, high-availability, and backup concepts This is equivalent to two years of hands-on experience working in a server environment.
These content examples are meant to clarify the test objectives and should not be construed as a comprehensive listing of all the content of this examination.
EXAM DEVELOPMENT
CompTIA exams result from subject matter expert workshops and industry-wide survey results regarding the skills and knowledge required of an IT professional.
CompTIA AUTHORIZED MATERIALS USE POLICY
CompTIA Certifications, LLC is not affiliated with and does not authorize, endorse or condone utilizing any content provided by unauthorized third-party training sites (aka “brain dumps”). Individuals who utilize such materials in preparation for any CompTIA examination will have their certifications revoked and be suspended from future testing in accordance with the CompTIA Candidate Agreement. In an effort to more clearly communicate CompTIA’s exam policies on use of unauthorized study materials, CompTIA directs
all certification candidates to the CompTIA Certification Exam Policies. Please review all CompTIA policies before beginning the study process for any CompTIA exam. Candidates will be required to abide by the CompTIA Candidate Agreement. If a candidate has a question as to whether study materials are considered unauthorized (aka “brain dumps”), he/she should contact CompTIA at examsecurity@comptia.org to confirm.
PLEASE NOTE
The lists of examples provided in bulleted format are not exhaustive lists. Other examples of technologies, processes, or tasks pertaining to each objective may also be included on the exam although not listed or covered in this objectives document. CompTIA is constantly reviewing the content of our exams and updating test questions to be sure our exams are current and the security of the questions is protected. When necessary, we will publish updated exams based on testing exam objectives. Please know that all related exam preparation materials will still be valid.
TEST DETAILS
Required exam SK0-005
Number of questions 90
Types of questions Multiple choice and performance-based Length of test 90 minutes
Recommended experience • Two years of hands-on experience working in a server environment
• CompTIA A+ certified or equivalent knowledge
Passing score 750
EXAM OBJECTIVES (DOMAINS)
The table below lists the domains measured by this examination and the extent to which they are represented.
1.0 Server Hardware Installation and Management 18%
2.0 Server Administration 30%
3.0 Security and Disaster Recovery 24%
4.0 Troubleshooting 28%
Total 100%
1.0 Server Hardware Installation and Management
Given a scenario, install physical hardware.
• Racking
- Enclosure sizes
- Unit sizes
- 1U, 2U, 3U, etc.
- Rack layout
- Cooling management
- Safety
- Proper lifting techniques
- Rack balancing
- Floor load limitations
- Power distribution unit (PDU)
- Keyboard-video-
mouse (KVM) placement
- Rail kits
• Power cabling
- Redundant power
- Uninterruptible power supply (UPS)
- Separate circuits
- Separate providers
- Power connector types
- Cable management
• Network cabling
- Redundant networking
- Twisted pair
- Fiber
- SC
- LC
- Single mode
- Multimode
- Gigabit
- 10 GigE
- Small form factor pluggable (SFP)
- SFP+
- Quad small form factor pluggable (QSFP)
- Cable management
• Server chassis types
- Tower
- Rack mount
- Blade enclosure
• Server components
- Hardware compatibility list (HCL)
- Central processing unit (CPU)
- Graphics processing unit (GPU)
- Memory
- Bus types
- Interface types
- Expansion cards
Given a scenario, deploy and manage storage.
• RAID levels and types
- 0
- 1
- 5
- 6
- 10
- Just a bunch of disks (JBOD)
- Hardware vs. software
• Capacity planning
• Hard drive media types
- Solid state drive (SSD)
- Wear factors
- Read intensive
- Write intensive
- Hard disk drive (HDD)
- Rotations per minute (RPM)
- 15,000
- 10,000
- 7,200
- Hybrid
• Interface types
- Serial attached SCSI (SAS)
- Serial ATA (SATA)
- Peripheral component interconnect (PCI)
- External serial advanced technology attachment (eSATA)
- Universal serial bus (USB)
- Secure digital (SD)
• Shared storage
- Network attached storage (NAS)
- Network file system (NFS)
- Common Internet file system (CIFS)
- Storage area network (SAN)
- Internet small
computer systems interface (iSCSI)
- Fibre Channel
- Fibre Channel over Ethernet (FCoE)
1.0 Server Hardware Installation and Management
Given a scenario, perform server hardware maintenance.
• Out-of-band management
- Remote drive access
- Remote console access
- Remote power on/off
- Internet protocol keyboard- video-mouse (IP KVM)
• Local hardware administration
- Keyboard-video-mouse (KVM)
- Crash cart
- Virtual administration console
- Serial connectivity
- Console connections
• Components
- Firmware upgrades
• Drives
• Hot-swappable hardware
- Drives
- Cages
- Cards
- Power supplies
- Fans
• Basic input/output system (BIOS)/Unified Extensible Firmware Interface (UEFI)
2.0 Server Administration
Given a scenario, install server operating systems.
• Minimum operating system (OS) requirements
• Hardware compatibility list (HCL)
• Installations
- Graphical user interface (GUI)
- Core
- Bare metal
- Virtualized
- Remote
- Slip streamed/unattended
- Scripted installations
- Additional drivers
- Additional applications and utilities
- Patches
- Media installation type
- Network
- Optical
- Universal serial bus (USB)
- Embedded
- Imaging
- Cloning
- Virtual machine (VM) cloning
- Physical clones
- Template deployment
- Physical to virtual (P2V)
• Partition and volume types
- Global partition table (GPT) vs. master boot record (MBR)
- Dynamic disk
- Logical volume management (LVM)
• File system types
- ext4
- New technology file system (NTFS)
- VMware file system (VMFS)
- Resilient file system (ReFS)
- Z file system (ZFS)
Given a scenario, configure servers to use network infrastructure services.
• IP configuration
• Virtual local area network (VLAN)
• Default gateways
• Name resolution
- Domain name service (DNS)
- Fully qualified domain name (FQDN)
- Hosts file
• Addressing protocols
- IPv4
- Request for comments (RFC) 1918 address spaces
- IPv6
• Firewall
- Ports
• Static vs. dynamic
- Dynamic host configuration protocol (DHCP)
- Automatic private IP address (APIPA)
• MAC addresses
Given a scenario, configure and maintain server functions and features.
• Server roles requirements
- Print
- Database
- File
- Web
- Application
- Messaging
- Baselining
- Documentation
- Performance metrics
• Directory connectivity
• Storage management
- Formatting
- Connectivity
- Provisioning
- Partitioning
- Page/swap/scratch location and size
- Disk quotas
- Compression
- Deduplication
• Monitoring
- Uptime
- Thresholds
- Performance
- Memory
- Disk
- Input output operations per second (IOPS)
- Capacity vs. utilization
- Network
- Central processing unit (CPU)
- Event logs
- Configuration
- Shipping
- Alerting
- Reporting
- Retention
- Rotation
• Data migration and transfer
- Infiltration
- Exfiltration
- Disparate OS data transfer
- Robocopy
- File transfer
- Fast copy
- Secure copy protocol (SCP)
• Administrative interfaces
- Console
- Remote desktop
- Secure shell (SSH)
- Web interface
Explain the key concepts of high availability for servers.
• Clustering
- Active-active
- Active-passive
- Failover
- Failback
- Proper patching procedures
- Heartbeat
• Fault tolerance
- Server-level redundancy vs. component redundancy
• Redundant server network infrastructure
- Load balancing
- Software vs. hardware
- Round robin
- Most recently used (MRU)
- Network interface card (NIC) teaming and redundancy
- Failover
- Link aggregation
Summarize the purpose and operation of virtualization.
• Host vs. guest
• Virtual networking
- Direct access (bridged)
- Network address translation (NAT)
- vNICs
- Virtual switches
• Resource allocation and provisioning
- CPU
- Memory
- Disk
- NIC
- Overprovisioning
- Scalability
• Management interfaces for virtual machines
• Cloud models
- Public
- Private
- Hybrid
Summarize scripting basics for server administration.
• Script types
- Bash
- Batch
- PowerShell
- Virtual basic script (VBS)
• Environment variables
• Comment syntax
• Basic script constructs
- Loops
- Variables
- Conditionals
- Comparators
• Basic data types
- Integers
- Strings
- Arrays
• Common server administration scripting tasks
- Startup
- Shut down
- Service
- Login
- Account creation
- Bootstrap
Explain the importance of asset management and documentation.
• Asset management
- Labeling
- Warranty
- Leased vs. owned devices
- Life-cycle management
- Procurement
- Usage
- End of life
- Disposal/recycling
- Inventory
- Make
- Model
- Serial number
- Asset tag
• Documentation management
- Updates
- Service manuals
- Architecture diagrams
- Infrastructure diagrams
- Workflow diagrams
- Recovery processes
- Baselines
- Change management
- Server configurations
- Company policies and procedures
- Business impact analysis (BIA)
- Mean time between failure (MTBF)
- Mean time to recover (MTTR)
- Recovery point objective (RPO)
- Recovery time objective (RTO)
- Service level agreement (SLA)
- Uptime requirements
• Document availability
• Secure storage of sensitive documentation
Explain licensing concepts.
• Models
- Per-instance
- Per-concurrent user
- Per-server
- Per-socket
- Per-core
- Site-based
- Physical vs. virtual
- Node-locked
- Signatures
• Open source
• Subscription
• License vs. maintenance and support
• Volume licensing
• License count validation
- True up
• Version compatibility
- Backward compatible
- Forward compatible
3.0 Security and Disaster Recovery
Summarize data security concepts.
• Encryption paradigms
- Data at rest
- Data in transit
• Retention policies
• Data storage
- Physical location storage
- Off-site vs. on-site
• UEFI/BIOS passwords
• Bootloader passwords
• Business impact
- Data value prioritization
- Life-cycle management
- Cost of security vs. risk and/or replacement
Summarize physical security concepts.
• Physical access controls
- Bollards
- Architectural reinforcements
- Signal blocking
- Reflective glass
- Datacenter camouflage
- Fencing
- Security guards
- Security cameras
- Locks
- Biometric
- Radio frequency identification (RFID)
- Card readers
- Mantraps
- Safes
• Environmental controls
- Fire suppression
- Heating, ventilation, and cooling (HVAC)
- Sensors
Explain important concepts pertaining to identity and access management for server administration.
• User accounts
• User groups
• Password policies
- Length
- Lockout
- Enforcement
• Permissions and access controls
- Role-based
- Rule-based
- Scope based
- Segregation of duties
- Delegation
• Auditing
- User activity
- Logins
- Group memberships
- Deletions
• Multifactor authentication (MFA)
- Something you know
- Something you have
- Something you are
• Single sign-on (SSO)
Explain data security risks and mitigation strategies.
• Security risks
- Hardware failure
- Malware
- Data corruption
- Insider threats
- Theft
- Data loss prevention (DLP)
- Unwanted duplication
- Unwanted publication
- Unwanted access methods
- Backdoor
- Social engineering
- Breaches
- Identification
- Disclosure
• Mitigation strategies
- Data monitoring
- Log analysis
- Security information and event management (SIEM)
- Two-person integrity
- Split encryption keys tokens
- Separation of roles
- Regulatory constraints
- Governmental
- Individually privileged information
- Personally identifiable information (PII)
- Payment Card Industry Data Security Standard (PCI DSS)
- Legal considerations
- Data retention
- Subpoenas
Given a scenario, apply server hardening methods.
• OS hardening
- Disable unused services
- Close unneeded ports
- Install only required software
- Apply driver updates
- Apply OS updates
- Firewall configuration
• Application hardening
- Install latest patches
- Disable unneeded services, roles, or features
• Host security
- Antivirus
- Anti-malware
- Host intrusion detection system (HIDS)/Host intrusion prevention system (HIPS)
• Hardware hardening
- Disable unneeded hardware
- Disable unneeded physical ports, devices, or functions
- Set BIOS password
- Set boot order
• Patching
- Testing
- Deployment
- Change management
Summarize proper server decommissioning concepts.
• Proper removal procedures
- Company policies
- Verify non-utilization
- Documentation
- Asset management
- Change management
• Media destruction
- Disk wiping
- Physical
- Degaussing
- Shredding
- Crushing
- Incineration
- Purposes for media destruction
• Media retention requirements
• Cable remediation
- Power
- Networking
• Electronics recycling
- Internal vs. external
- Repurposing
Explain the importance of backups and restores.
• Backup methods
- Full
- Synthetic full
- Incremental
- Differential
- Archive
- Open file
- Snapshot
• Backup frequency
• Media rotation
• Backup media types
- Tape
- Cloud
- Disk
- Print
• File-level vs. system-state backup
• Restore methods
- Overwrite
- Side by side
- Alternate location path
• Backup validation
- Media integrity
- Equipment
- Regular testing intervals
• Media inventory before restoration
Explain the importance of disaster recovery.
• Site types
- Hot site
- Cold site
- Warm site
- Cloud
- Separate geographic locations
• Replication
- Constant
- Background
- Synchronous vs. asynchronous
- Application consistent
- File locking
- Mirroring
- Bidirectional
• Testing
- Tabletops
- Live failover
- Simulated failover
- Production vs. non-production
4.0 Troubleshooting
Explain the troubleshooting theory and methodology.
• Identify the problem and determine the scope.
- Question users/stakeholders and identify changes to
the server/environment.
- Collect additional documentation/logs.
- If possible, replicate the problem as appropriate.
- If possible, perform backups before making changes.
- Escalate, if necessary.
• Establish a theory of probable cause (question the obvious).
- Determine whether there is
a common element or symptom causing multiple problems.
• Test the theory to determine the cause.
- Once the theory is confirmed, determine the next steps to resolve the problem.
- If the theory is not confirmed, establish a new theory.
• Establish a plan of action to resolve the problem.
- Notify impacted users.
• Implement the solution or escalate.
- Make one change at a time and test/confirm the change has resolved the problem.
- If the problem is not resolved, reverse the change, if appropriate, and implement a new change.
• Verify full system functionality and, if applicable, implement preventive measures.
• Perform a root cause analysis.
• Document findings, actions, and outcomes throughout the process.
Given a scenario, troubleshoot common hardware failures.
• Common problems
- Predictive failures
- Memory errors and failures
- System crash
- Blue screen
- Purple screen
- Memory dump
- Utilization
- Power-on self-test (POST) errors
- Random lockups
- Kernel panic
- Complementary metal-oxide- semiconductor (CMOS) battery failure
- System lockups
- Random crashes
- Fault and device indication
- Visual indicators
- Light-emitting diode (LED)
- Liquid crystal display (LCD) panel readouts
- Auditory or olfactory cues
- POST codes
- Misallocated virtual resources
• Causes of common problems
- Technical
- Power supply fault
- Malfunctioning fans
- Improperly seated heat sink
- Improperly seated cards
- Incompatibility of components
- Cooling failures
- Backplane failure
- Firmware incompatibility
- CPU or GPU overheating
- Environmental
- Dust
- Humidity
- Temperature
• Tools and techniques
- Event logs
- Firmware upgrades or downgrades
- Hardware diagnostics
- Compressed air
- Electrostatic discharge (ESD) equipment
- Reseating or replacing components and/or cables
Given a scenario, troubleshoot storage problems.
• Common problems
- Boot errors
- Sector block errors
- Cache battery failure
- Read/write errors
- Failed drives
- Page/swap/scratch file or partition
- Partition errors
- Slow file access
- OS not found
- Unsuccessful backup
- Unable to mount the device
- Drive not available
- Cannot access logical drive
- Data corruption
- Slow I/O performance
- Restore failure
- Cache failure
- Multiple drive failure
• Causes of common problems
- Disk space utilization
- Insufficient disk space
- Misconfigured RAID
- Media failure
- Drive failure
- Controller failure
- Hot bus adapter (HBA) failure
- Loose connectors
- Cable problems
- Misconfiguration
- Corrupt boot sector
- Corrupt filesystem table
- Array rebuild
- Improper disk partition
- Bad sectors
- Cache battery failure
- Cache turned off
- Insufficient space
- Improper RAID configuration
- Mismatched drives
- Backplane failure
• Tools and techniques
- Partitioning tools
- Disk management
- RAID and array management
- System logs
- Disk mounting commands
- net use
- mount
- Monitoring tools
- Visual inspections
- Auditory inspections
Given a scenario, troubleshoot common OS and software problems.
• Common problems
- Unable to log on
- Unable to access resources
- Unable to access files
- System file corruption
- End of life/end of support
- Slow performance
- Cannot write to system logs
- Service failures
- System or application hanging
- Freezing
- Patch update failure
• Causes of common problems
- Incompatible drivers/modules
- Improperly applied patches
- Unstable drivers or software
- Server not joined to domain
- Clock skew
- Memory leaks
- Buffer overrun
- Incompatibility
- Insecure dependencies
- Version management
- Architecture
- Update failures
- Missing updates
- Missing dependencies
- Downstream failures due to updates
- Inappropriate application- level permissions
- Improper CPU affinity and priority
• OS and software tools and techniques
- Patching
- Upgrades
- Downgrades
- Package management
- Recovery
- Boot options
- Safe mode
- Single user mode
- Reload OS
- Snapshots
- Proper privilege escalations
- runas/Run As
- sudo
- su
- Scheduled reboots
- Software firewalls
- Adding or removing ports
- Zones
- Clocks
- Network time protocol (NTP)
- System time
- Services and processes
- Starting
- Stopping
- Status identification
- Dependencies
- Configuration management
- System center configuration manager (SCCM)
- Puppet/Chef/Ansible
- Group Policy Object (GPO)
- Hardware compatibility list (HCL)
Given a scenario, troubleshoot network connectivity issues.
• Common problems
- Lack of Internet connectivity
- Resource unavailable
- Receiving incorrect DHCP information
- Non-functional or unreachable
- Destination host unreachable
- Unknown host
- Unable to reach remote subnets
- Failure of service provider
- Cannot reach server by hostname/ fully qualified domain name (FQDN)
• Causes of common problems
- Improper IP configuration
- IPv4 vs. IPv6 misconfigurations
- Improper VLAN configuration
- Network port security
- Component failure
- Incorrect OS route tables
- Bad cables
- Firewall (misconfiguration, hardware failure, software failure)
- Misconfigured NIC
- DNS and/or DHCP failure
- DHCP server misconfigured
- Misconfigured hosts file
• Tools and techniques
- Check link lights
- Confirm power supply
- Verify cable integrity
- Check appropriate cable selection
- Commands
- ipconfig
- ip addr
- ping
- tracert
- traceroute
- nslookup
- netstat
- dig
- telnet
- nc
- nbtstat
- route
Given a scenario, troubleshoot security problems.
• Common concerns
- File integrity
- Improper privilege escalation
- Excessive access
- Applications will not load
- Cannot access network fileshares
- Unable to open files
• Causes of common problems
- Open ports
- Services
- Active
- Inactive
- Orphan/zombie
- Intrusion detection configurations
- Anti-malware configurations
- Improperly configured local/group policies
- Improperly configured firewall rules
- Misconfigured permissions
- Virus infection
- Malware
- Rogue processes/services
- Data loss prevention (DLP)
• Security tools
- Port scanners
- Sniffers
- Telnet clients
- Anti-malware
- Antivirus
- File integrity
- Checksums
- Monitoring
- Detection
- Enforcement
- User access controls
- SELinux
- User account control (UAC)
CompTIA Server+ (SK0-005) Acronym List
The following is a list of acronyms that appear on the CompTIA Server+ exam. Candidates are encouraged to review the complete list and attain a working knowledge of all listed acronyms as a part of a comprehensive exam preparation program.
ACRONYM SPELLED OUT ACRONYM SPELLED OUT
ACL Access Control List GPU Graphics Processing Unit
AD Active Directory GUI Graphical User Interface
APIPA Automatic Private IP Address HBA Host Bus Adapter
BCP Business Continuity Plan HCL Hardware Compatibility List
BIA Business Impact Analysis HID Human Interface Device
BIOS Basic Input/Output System HIDS Host Intrusion Detection System
BSOD Blue Screen of Death HIPS Host Intrusion Prevention System
CIDR Classless Inter-Domain Routing HTTP Hyper Text Transport Protocol
CIFS Common Internet File System HTTPS Secure Hyper Text Transport Protocol
CIMC Cisco Integrated Management Controller HVAC Heating Ventilation and Air Conditioning
CLI Command Line Interface IDF Intermediate Distribution Frame
CMOS Complementary Metal-Oxide-Semiconductor iDRAC Integrated Dell Remote Access Control
COOP Continuity of Operations IDS Intrusion Detection System
CPU Central Processing Unit IIS Internet Information Services
CRU Customer Replaceable Unit iLO Integrated Lights Out
DAS Direct Attached Storage IMAP4 Internet Mail Access Protocol
DC Domain Controller Intel-VT Intel Virtualization Technology
DDoS Distributed Denial of Service IOPS Input Output Operations per Second
DHCP Dynamic Host Configuration Protocol IP Internet Protocol
DLP Data Loss Prevention IP KVM Internet Protocol Keyboard-Video-Mouse
DLT Digital Linear Tape IPMI Intelligent Platform Management Interface
DMZ Demilitarized Zone IPS Intrusion Prevention System
DNS Domain Name Service IPSEC Internet Protocol Security
DR Disaster Recovery IPv6 Internet Protocol version 6
ECC Error Checking and Correction iSCSI Internetworking Small Computer System Interface
EFS Encrypting File System ISO International Organization for Standardization
eSATA External Serial Advanced Technology Attachment JBOD Just a Bunch of Disks
ESD Electrostatic Discharge KVM Keyboard-Video-Mouse
FAT File Allocation Table LAN Local Area Network
FCoE Fibre Channel over Ethernet LC Lucent Connector/Little Connector
FQDN Fully Qualified Domain Name LCD Liquid Crystal Display
FRU Field Replaceable Unit LDAP Lightweight Directory Access Protocol
FTP File Transfer Protocol LED Light Emitting Diode
FTPS File Transfer Protocol over SSL LTO Linear Tape-Open
GFS Grandfather Father Son LUN Logical Unit Number
GPO Group Policy Object LVM Logical Volume Management
GPT GUID Partition Table MAC Media Access Control
ACRONYM SPELLED OUT ACRONYM SPELLED OUT
MBR Master Boot Record SAS Serial Attached SCSI
MDF Main Distribution Frame SATA Serial ATA
MFA Multifactor Authentication SC Standard Connector
MIB Management Information Base SCCM System Center Configuration Management
MMC Microsoft Management Console SCP Secure Copy Protocol
MRU Most Recently Used SCSI Small Computer System Interface
MTBF Mean Time Between Failure SD Secure Digital
MTTR Mean Time to Recover SELinux Security Enhanced Linux
NAC Network Access Control SFP Small Form Factor Pluggable
NAS Network Attached Storage SFTP Secure File Transfer Protocol
NAT Network Address Translation SLA Service Level Agreement
NetBIOS Network Basic Input Output System SMTP Simple Mail Transport Protocol
NFS Network File System SNMP Simple Network Management Protocol
NIC Network Interface Card SQL Structured Query Language
NIDS Network Intrusion Detection System SSD Solid State Drive
NIST National Institute of Standards and Technology SSH Secure Shell
NLB Network Load Balancing SSL Secure Sockets Layer
NOS Network Operating System SSO Single Sign-On
NTFS New Technology File System ST Straight Tip
NTP Network Time Protocol TACACS Terminal Access Controller Access Control System
OEM Original Equipment Manufacturer TCP Transmission Control Protocol
OS Operating System TCP/IP Transmission Control Protocol/Internet Protocol
OTP One-Time Password TFTP Trivial File Transfer Protocol
OU Organizational Units TLS Transport Layer Security
P2V Physical to Virtual UAC User Account Control
PAT Port Address Translation UDP User Datagram Protocol
PCI Peripheral Component Interconnect UEFI Unified Extensible Firmware Interface
PCI DSS Payment Card Industry Data Security Standard UID Unit Identification
PCIe Peripheral Component Interconnect Express UPS Uninterruptible Power Supply
PCI-X Peripheral Component Interconnect Extended URL Universal/Uniform Resource Locator
PDU Power Distribution Unit USB Universal Serial Bus
PII Personally Identifiable Information UUID Universal Unique Identifier
PKI Public Key Infrastructure VBS Visual Basic Script
POST Power on Self-Test VLAN Virtual Local Area Network
PSU Power Supply Unit VM Virtual Machine
PXE Preboot Execution Environment VMFS VMWare File System
QSFP Quad-Small Form Factor Pluggable VNC Virtual Network Computing
RADIUS Remote Authentication Dial-in User Service vNIC Virtual Network Interface Card
RAID Redundant Array of VoIP Voice over IP
Inexpensive/Integrated Disks/Drives VPN Virtual Private Network
RAM Random Access Memory VSS Volume Shadow Service
RAS Remote Access Server VT Virtualization Technology
RDP Remote Desktop Protocol WDS Windows Deployment Services
ReFS Resilient File System WINS Windows Internet Naming Service
RFC Request for Comments WMI Windows Management Instrumentation
RFID Radio Frequency Identification WOL Wake on LAN
RIS Remote Installation Service WSUS Windows Software Update Services
RJ45 Registered Jack 45 WWNN World Wide Node Name
RPM Rotations per Minute WWPN World Wide Port Name
RPO Recovery Point Objective XD Execute Disable
RTO Recovery Time Objective ZFS Z File System
SAN Storage Area Network
Server+ Proposed Hardware and Software List
CompTIA has included this sample list of hardware and software to assist candidates as they prepare for the Server+ exam. This list may also be helpful for training companies that wish to create a lab component for their training offering. The bulleted lists below each topic are samples and are not exhaustive.
HARDWARE
• Computer capable of virtualization
• Cables
• USB flash drive
• KVM*
• Rack*
• UPS*
• Switch*
• Storage device*
*Ideal, but not necessary for lab setup
SOFTWARE
• Server operating system
• Virtualization software
• Antivirus/anti-malware
© 2019 CompTIA Properties, LLC, used under license by CompTIA Certifications, LLC. All rights reserved. All certification programs and education related to such programs are operated exclusively by CompTIA Certifications, LLC. CompTIA is a registered trademark of CompTIA Properties, LLC in the U.S. and internationally. Other brands and company names mentioned herein may be trademarks or service marks of CompTIA Properties, LLC or of their respective owners. Reproduction or dissemination prohibited without written consent of CompTIA Properties, LLC. Printed in the U.S. 06885-Jul2019