The top level exam objectives for Comptia Server+ exam are given below:
Domain
% of Examination
1.0 Server Architecture 12%
2.0 Server Administration 24%
3.0 Storage 12%
4.0 Security 13%
5.0 Networking 10%
6.0 Disaster Recovery 9%
7.0 Troubleshooting 20%
Total 100%
Detailed Exam objectives for Comptia Server+:
The CompTIA Server+ Certification Exam Objectives are subject to change without notice.
1.0 Server Architecture
1.1 Explain the purpose and function of server form factors
- Rack mount
o Dimensions: 1U, 2U, 4U
o Cable management arms
o Rail kits
- Tower
- Blade technology
o Blade enclosure
Backplane / Midplane
Power supply sockets
Network modules / switches
Management modules
o Blade server
1.2 Given a scenario, install, configure and maintain server components
- CPU
o Multiprocessor vs. multicore
o Socket type
o Cache levels: L1, L2, L3
o Speeds
- Core
- Bus
- Multiplier
o CPU stepping
o Architecture
- x86
- x64
- ARM
- RAM
o ECC vs. non-ECC
o DDR2, DDR3
o Number of pins
o Static vs. dynamic
o Module placement
o CAS latency
o Timing
o Memory pairing
- Bus types, bus channels and expansion slots
o Height differences and bit rate differences
o PCI
o PCIe
o PCI-X
- NICs
- Hard drives
- Riser cards
- RAID controllers
- BIOS/UEFI
o CMOS battery
- Firmware
- USB interface/port
- Hotswap vs. non-hotswap components
1.3 Compare and contrast power and cooling components
- Power
o Voltage
- 110v vs. 220v vs. -48v
- 208v vs. 440v/460v/480v
o Wattage
o Consumption
o Redundancy
o 1-phase vs. 3-phase power
o Plug types
- NEMA
- Edison
- Twist lock
- Cooling
o Airflow
o Thermal dissipation
o Baffles / shrouds
o Fans
o Liquid cooling
2.0 Server Administration
2.1 Install and configure server operating systems
Determine server role/purpose
Update firmware
BIOS/UEFI configuration
o Boot order
Disk preparation
o RAID setup
o Partitioning
o Formatting
o File system type
- Ext 2, 3, 4
- NTFS
- FAT32
- ReiserFS
- UFS
- VMFS
- ZFS
o Swap
Configure host name
Local account setup
Connect to network
Join domain/directory
Address security concerns
o Patching
o OS hardening
o Compliance to company procedures/standards
Enable services
Install features/roles/applications/drivers
Performance baseline
o Server optimization
o Swap or pagefile optimization
- Unattended/remote installations
o Deploying images and cloning
o Scripted installs
- PXE boot
- TFTP
2.2 Compare and contrast server roles and requirements for each
Web server
Application server
Directory server
Database server
File server
Print server
Messaging server
Mail server
Routing and remote access server
Network services server
o DHCP
o DNS/WINS
o NTP
2.3 Given a scenario, use access and control methods to administer a server
Local hardware administration
o KVM
o Serial
o Virtual Administration console
Network-based hardware administration
o KVM over IP
o ILO
o iDRAC
Network-based operating system administration
o RDP
o SSH
o VNC
o Command line / shell
2.4 Given a scenario, perform proper server maintenance techniques
Change management
Patch management
o Operating System updates
o Application updates
o Security software updates
o Firmware updates
o Device drivers updates
o Compatibility lists
Operating systems
Hardware
Applications
o Testing and validation
Outages & Service Level Agreements
o Scheduled downtime
o Unscheduled downtime
o Impact analysis
o Client notification
o MTTR
Performance monitoring
o CPU utilization
o Memory utilization
o Network utilization
o Disk utilization
Disk IOPS
Storage capacity
o Comparison against performance baseline
o Processes and services monitoring
o Log monitoring
Hardware maintenance
o Check system health indicators
LEDs
Error codes
Beep codes
LCD messages
o Replace failed components
Fans
Hard drives
RAM
Backplanes
Batteries
o Preventative maintenance
Clearing dust
Check proper air flow
o Proper shut down procedures
Fault tolerance and high availability techniques
o Clustering
Active/active
Active/passive
o Load balancing
Round robin
Heartbeat
2.5 Explain the importance of asset management and documentation
Asset management
o Licensing
o Labeling
o Warranty
o Life cycle management
Procurement
Usage
End of life
Disposal/recycling
o Inventory
Make
Model
Serial number
Asset tag
Documentation
o Service manuals
o Network diagrams
o Architecture diagrams
o Dataflow diagrams
o Recovery documentation
o Baseline documentation
o Change management policies
o Service Level Agreement
o Server configuration
Secure storage of sensitive documentation
2.6 Explain the purpose and operation of virtualization components
Hosts and guests
Management interface for virtual machines
Hypervisor
o Type I
o Type II
o Hybrid
Hardware compatibility list
o BIOS/UEFI compatibility and support
o CPU compatibility support
o AMD-V / Intel VT
Resource allocation between Guest and Host
o CPU
o Storage
o Memory
o Network connectivity
Direct Access (Bridging) vs. NAT
Virtual NICs
Virtual switches
o Video
3.0 Storage
3.1 Given a scenario, install and deploy primary storage devices based on given specifications and interfaces
Disk specifications
o RPM
o Dimensions/form factor
o Capacity
o Bus width
o IOPS
o Seek time and latency
o Hotswap vs. non-hotswap components
Interfaces
o SAS
o SATA
o SCSI
o USB
o Fiber Channel
Hard drive vs. SSD
3.2 Given a scenario, configure RAID using best practices
RAID levels and performance considerations
o 0
o 1
o 5
o 6
o 10
Software vs. hardware RAID
o Performance considerations
Configuration specifications
o Capacity
o Bus types
o Drive RPM
Hotswap support and ramifications
Hot spare vs. cold spare
Array controller
o Memory
o Battery backed cache
o Redundant controller
3.3 Summarize hardware and features of various storage technologies
DAS
NAS
o iSCSI
o FCoE
SAN
o Fiber Channel
o LUN & LUN masking
o HBAs and fabric switches
JBOD
Tape
o Drive
o Libraries
Optical drive
Flash, Compact Flash and USB drive
3.4 Given a scenario, calculate appropriate storage capacity and plan for future growth
Base10 vs. Base2 disk size calculation (1000 vs. 1024)
Disk quotas
Compression
Capacity planning considerations:
o Operating system growth
Patches
Service packs
Log files
o Temporary directories
o Databases
o Application servers
o File servers
o Archival
4.0 Security
4.1 Compare and contrast physical security methods and concepts
Multifactor Authentication
o Something you have
o Something you know
o Something you are
Security concepts
o Mantrap
o RFID chip
o ID card
o Biometric
o Keypad
o Access list
o Security guard
o Security camera
o Keys & Locks
Cabinet
Rack mount
Server
o Safe
4.2 Given a scenario, apply server hardening techniques
OS hardening
o Stopping unneeded services / closing unneeded ports
o Install only required software
o Install latest operating system patches
Application hardening
o Install latest patches
o Disabling unneeded services/roles/features
Endpoint security
o HIDS
o Anti-malware
Remediate security issues based on a vulnerability scan
Hardware hardening
o Disabling unneeded hardware and physical ports/devices
o BIOS password
o Disable WOL (Wake on LAN)
o Setup boot order
o Chassis locks / intrusion detection
4.3 Explain basic network security systems and protocols
Firewall
o Network-based
o Host-based
Port security / 802.1x / NAC
Router access list
NIDS
Authentication protocols
o LDAP
o RADIUS
o TACACS
o TACACS+
PKI
o Private key
o Public key
o Certificate authority
o SSL/TLS
VPN
IPSEC
VLAN
Security zones
o DMZ
o Public and private
o Intranet and extranet
4.4 Implement logical access control methods based on company policy
Access control lists
o Users
o Groups
Roles
o Resources
File system
Network ACLs
Peripheral devices
Administrative rights
Distribution lists
Permissions
o Read
o Write/Modify
o Execute
o Delete
o Full control/Superuser
o File vs. share
4.5 Implement data security methods and secure storage disposal techniques
Storage encryption
o File level encryption
o Disk encryption
o Tape encryption
Storage media
o Soft wipe
File deletion
o Hard wipe
Zero out all sectors
o Physical destruction
o Remote wipe
4.6 Given a scenario, implement proper environmental controls and techniques
Power concepts and best practices
o UPS
Runtime vs. capacity
Automated graceful shutdown of attached devices
Periodic testing of batteries
Maximum load
Bypass procedures
Remote management
o PDU
Connect redundant rack PDUs to separate circuits
o Capacity planning
PDU ratings
UPS ratings
Total potential power draw
o Multiple circuits
Connect redundant power supplies to separate PDUs
Safety
o ESD procedures
o Fire suppression
o Proper lifting techniques
o Rack stability
o Floor load limitations
o Sharp edges and pinch points
HVAC
o Room and rack temperature and humidity
Monitoring and alert notifications
o Air flow
Rack filler/baffle/blanking panels
o Hot aisle and cold aisle
5.0 Networking
5.1 Given a scenario, configure servers to use IP addressing and network infrastructure services
IPv4 vs. IPv6
Default gateway
CIDR notation and subnetting
Public and private IP addressing
Static IP assignment vs. DHCP
DNS
o FQDN
o Default domain suffix / search domain
WINS
NetBIOS
NAT/PAT
MAC addresses
Network Interface Card configuration
o NIC teaming
o Duplexing
Full
Half
Auto
o Speeds
10/100/1000 Mbps
10 Gbps
5.2 Compare and contrast various ports and protocols
TCP vs. UDP
SNMP 161
SMTP 25
FTP 20/21
SFTP 22
SSH 22
SCP 22
NTP 123
HTTP 80
HTTPS 443
TELNET 23
IMAP 143
POP3 110
RDP 3389
FTPS 989/990
LDAP 389/3268
DNS 53
DHCP 68
5.3 Given a scenario, install cables and implement proper cable management procedures
Copper
o Patch cables
Crossover
Straight through
Rollover
o CAT5
o CAT5e
o CAT6
Fiber
o Singlemode
o Multimode
Connectors
o ST
o LC
o SC
o SFP
o RJ-45
o RJ-11
Cable placement and routing
o Cable channels
o Cable management trays
Vertical
Horizontal
Labeling
Bend radius
Cable ties
6.0 Disaster Recovery
6.1 Explain the importance of disaster recovery principles
Site types
o Hot site
o Cold site
o Warm site
Replication methods
o Disk to disk
o Server to server
o Site to site
Continuity of Operations
o Disaster recovery plan
o Business continuity plan
o Business impact analysis
Who is affected
What is affected
Severity of impact
6.2 Given a scenario, implement appropriate backup techniques
Methodology
o Full/Normal
Copy
o Incremental
o Differential
o Snapshot
o Selective
o Bare metal
o Open file
o Data vs. OS restore
Backup media
o Linear Access
Tape
o Random Access
Disk
Removable media
Optical media
Media and restore best practices
o Labeling
o Integrity verification
o Test restorability
o Tape rotation and retention
Media storage location
o Offsite
o Onsite
o Security considerations
o Environmental considerations
7.0 Troubleshooting
7.1 Explain troubleshooting theory and methodologies
Identify the problem and determine the scope
o Question users/stakeholders and identify changes to the server / environment
o Collect additional documentation / logs
o If possible, replicate the problem as appropriate
o If possible, perform backups before making changes
Establish a theory of probable cause (question the obvious)
o Determine whether there is a common element of symptom causing multiple problems
Test the theory to determine cause
o Once theory is confirmed, determine next steps to resolve problem
o If theory is not confirmed, establish new theory or escalate
Establish a plan of action to resolve the problem and notify impacted users
Implement the solution or escalate as appropriate
o Make one change at a time and test/confirm the change has resolved the problem
o If the problem is not resolved, reverse the change if appropriate and implement new change
Verify full system functionality and if applicable implement preventative measures
Perform a root cause analysis
Document findings, actions and outcomes throughout the process
7.2 Given a scenario, effectively troubleshoot hardware problems, selecting the appropriate tools and methods
Common problems
o Failed POST
o Overheating
o Memory failure
o Onboard component failure
o Processor failure
o Incorrect boot sequence
o Expansion card failure
o Operating system not found
o Drive failure
o Power supply failure
o I/O failure
Causes of common problems
o Third party components or incompatible components
o Incompatible or incorrect BIOS
o Cooling failure
o Mismatched components
o Backplane failure
Environmental issues
o Dust
o Humidity
o Temperature
o Power surge / failure
Hardware tools
o Power supply tester (multimeter)
o Hardware diagnostics
o Compressed air
o ESD equipment
7.3 Given a scenario, effectively troubleshoot software problems, selecting the appropriate tools and methods
Common problems
o User unable to logon
o User cannot access resources
o Memory leak
o BSOD / stop
o OS boot failure
o Driver issues
o Runaway process
o Cannot mount drive
o Cannot write to system log
o Slow OS performance
o Patch update failure
o Service failure
o Hangs no shut down
o Users cannot print
Cause of common problems
o User Account Control (UAC/SUDO)
o Corrupted files
o Lack of hard drive space
o Lack of system resources
o Virtual memory (misconfigured, corrupt)
o Fragmentation
o Print server drivers/services
o Print spooler
Software tools
o System logs
o Monitoring tools (resource monitor, performance monitor)
o Defragmentation tools
o Disk property tools (usage, free space, volume or drive mapping)
7.4 Given a scenario, effectively diagnose network problems, selecting the appropriate tools and methods
Common problems
o Internet connectivity failure
o Email failure
o Resource unavailable
o DHCP server mis-configured
o Non-functional or unreachable
o Destination host unreachable
o Unknown host
o Default gateway mis-configured
o Failure of service provider
o Cannot reach by host name/FQDN
Causes of common problems
o Improper IP configuration
o VLAN configuration
o Port security
o Improper subnetting
o Component failure
o Incorrect OS route tables
o Bad cables
o Firewall (mis-configuration, hardware failure, software failure)
o Mis-configured NIC, routing / switch issues
o DNS and/or DHCP failure
o Mis-configured hosts file
o IPv4 vs. IPv6 misconfigurations
Networking tools
o ping
o tracert / traceroute
o ipconfig / ifconfig
o nslookup
o net use / mount
o route
o nbtstat
o netstat
7.5 Given a scenario, effectively troubleshoot storage problems, selecting the appropriate tools and methods
Common problems
o Slow file access
o OS not found
o Data not available
o Unsuccessful backup
o Error lights
o Unable to mount the device
o Drive not available
o Cannot access logical drive
o Data corruption
o Slow I/O performance
o Restore failure
o Cache failure
o Multiple drive failure
Causes of common problems
o Media failure
o Drive failure
o Controller failure
o HBA failure
o Loose connectors
o Cable problems
o Mis-configuration
o Improper termination
o Corrupt boot sector
o Corrupt file system table
o Array rebuild
o Improper disk partition
o Bad sectors
o Cache battery failure
o Cache turned off
o Insufficient space
o Improper RAID configuration
o Mis-matched drives
o Backplane failure
Storage tools
o Partitioning tools
o Disk management
o RAID array management
o Array management
o System logs
o Net use / mount command
o Monitoring tools
7.6 Given a scenario, effectively diagnose security issues, selecting the appropriate tools and methods
Common problems
o File integrity issue
o Privilege escalation
o Applications will not load
o Can't access network file/shares
o Unable to open files
o Excessive access
o Excessive memory utilization
Causes of common problems
o Open ports
o Active services
o Inactive services
o Intrusion detection configurations
o Anti-malware configurations
o Local/group policies
o Firewall rules
o Misconfigured permissions
o Virus infection
o Rogue processes/services
Continued on next page...
Security tools
o Port scanners
o Sniffers
o Cipher
o Checksums
o Telnet client
o Anti-malware