Mastin Gallery

Mastin Espanol Gallery - All photos: © Copyright by the owners!
Get our Pass4sure SK0-003 test prep with certification sample and pass SK0-003 exam.

Very Tough SK0-003 exam questions asked in the exam.

SK0-003 certification sample | SK0-003 past bar exams | SK0-003 Practice test | SK0-003 exam answers | SK0-003 entrance exam - Officialcerts.com



SK0-003 - CompTIA Server+ Certification - Dump Information

Vendor : CompTIA
Exam Code : SK0-003
Exam Name : CompTIA Server+ Certification
Questions and Answers : 529 Q & A
Updated On : August 22, 2017
PDF Download Mirror : SK0-003 Brain Dump
Get Full Version : Officialcerts SK0-003 Full Version


Observed maximum SK0-003 Questions in braindumps that I prepared.

Officialcerts Q&A is the most ideal way I have ever gone over to get ready and pass IT exams. I wish more individuals thought about it. Yet then, there would be more risks someone could shut it down. The thing is, it provides for the same thing what I have to know for an exam. Whats more I mean diverse IT exams, SK0-003 with 88% marks. My associate utilized Officialcerts Q&A for Many different certificates, all great and substantial. Completely solid, my individual top picks.

Did you tried this great source of Latest Braindumps.

This is a gift from Officialcerts for all the candidates to get latest study materials for SK0-003 exam. All the members of Officialcerts are doing a great job and ensuring success of candidates in SK0-003 exams. I passed the SK0-003 exam just because I used Officialcerts materials.

Do not spill huge amount at SK0-003 guides, checkout these q and a.

I am saying from my experience that if you solve the question papers one by one then you will definitely crack the exam. Officialcerts has very effective study material. Such a very useful and helpful website. Thanks Team Officialcerts.

New Syllabus SK0-003 Exam q and a are provided here.

I was working as an administrator and was preparing for the SK0-003 exam as well. Referring to detailed books was making my preparation difficult for me. But after I referred to Officialcerts, I found out that I was easily memorizing the relevant answers of the questions. Officialcerts made me confident and helped me in attempting 60 questions in 80 minutes easily. I passed this exam successfully. I only recommend Officialcerts to my friends and colleagues for easy preparation. Thanks Officialcerts.

Do a smart move, prepare these SK0-003 Questions and Answers.

I passed the SK0-003 exam and highly recommend Officialcerts to everyone who considers purchasing their materials. This is a fully valid and reliable preparation tool, a great option for those who cannot afford signing up for full-time courses (which is a waste of money and time if you ask me! Especially if you have Officialcerts). In case you were wondering, the questions are real!

What are benefits of SK0-003 certification?

I would often miss classes and that would be a huge hindrance for me if my parents found out. I needed to cover my mistakes and make sure that they could believe in me. I knew that one way to cover my mistakes was to do well in my SK0-003 test that was very near. If I did well in my SK0-003 test, my parents would love me again and that they did because I was able to clear the test. It was this Officialcerts that gave me the perfect instructions. Thank you.

Found an accurate source for real SK0-003 Actual Questions.

Officialcerts gave me an excellent preparation tool. I used it for my SK0-003 exam and got a maximum score. I love the way Officialcerts does their exam preparation. Basically, this is a dump, so you get questions that are used on the real SK0-003 exams. But the testing engine and the practice exam format help you memorize it all very well, so you end up learning things, and will be able to draw upon this knowledge in the future. Very good quality, and the testing engine is very light and user friendly. I didnt come across any issues, so this is excellent value for money.

Great source of great Actual Questions, accurate answers.

This is the best exam readiness I have ever gone over. I passed this SK0-003 partner exam bother free. No shove, no tension, and no sadness amid the exam. I knew all that I required to know from this Officialcerts Q&A pack. The inquiries are substantial, and I got notification from my companion that their cash back surety lives up to expectations.

Get high scores in little time for preparation.

First of all I want to say Thanks to you people. I have cleared SK0-003 Exam by subscribing to your study materials. So I wanted to share my success on your website. Thank you once again. Thank you very much for your great support. I have cleared my SK0-003 with 90%.

Found an accurate source for real SK0-003 braindumps.

It is my pleasure to thank you very much for being here for me. I passed my SK0-003 certification with flying colors. Now I am SK0-003 certified.

Latest Exams added on Officialcerts

1Z0-453 | 210-250 | 300-210 | 500-205 | 500-210 | 70-765 | 9A0-409 | C2010-555 | C2090-136 | C9010-260 | C9010-262 | C9020-560 | C9020-568 | C9050-042 | C9050-548 | C9050-549 | C9510-819 | C9520-911 | C9520-923 | C9520-928 | C9520-929 | C9550-512 | CPIM-BSP | C_TADM70_73 | C_TB1200_92 | C_TBW60_74 | C_TPLM22_64 | C_TPLM50_95 | DNDNS-200 | DSDPS-200 | E20-562 | E20-624 | E_HANABW151 | E_HANAINS151 | JN0-1330 | JN0-346 | JN0-661 | MA0-104 | MB2-711 | NSE6 | OMG-OCRES-A300 | P5050-031 |

See more dumps on Officialcerts

HP0-J40 | 060-DSFA680 | HP0-P13 | NS0-310 | HP0-J64 | HP0-D07 | COG-112 | C_TERP10_66 | 644-068 | 8002 | I10-001 | HP0-891 | HP3-C30 | M2150-753 | HP0-M24 | 000-822 | ISSMP | 190-833 | 77-888 | ST0-91X | HP0-758 | HP0-J18 | NQ0-231 | CCNT | LOT-927 | 310-880 | 000-293 | 000-M17 | 1Y0-800 | 000-715 | GPEN | 3600-1 | E20-616 | 000-N10 | JN0-101 | 000-M19 | 310-813 | HP0-A100 | 000-376 | 9L0-837 | EMT | 1Z0-501 | 3605 | 1Z0-041 | 922-104 | VCP-101V | 090-161 | CCSA | HP0-P15 | C2020-645 |

SK0-003 Questions and Answers

h1 { color: #F00; font-family:"Times New Roman", serif; font-style: normal; font-weight: bold; text-decoration: none; font-size: 12pt; } .p, p { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 12pt; margin:0pt; } li {display: block; } #l1 {padding-left: 0pt;counter-reset: c1 0; } #l1> li:before {counter-increment: c1; content: counter(c1, upper-latin)". "; color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 12pt; } li {display: block; } #l2 {padding-left: 0pt;counter-reset: d1 0; } #l2> li:before {counter-increment: d1; content: counter(d1, upper-latin)". "; color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 12pt; } li {display: block; } #l3 {padding-left: 0pt;counter-reset: e1 0; } #l3> li:before {counter-increment: e1; content: counter(e1, upper-latin)". "; color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 12pt; } li {display: block; } #l4 {padding-left: 0pt;counter-reset: f1 0; } #l4> li:before {counter-increment: f1; content: counter(f1, upper-latin)". "; color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 12pt; } li {display: block; } #l5 {padding-left: 0pt;counter-reset: g1 0; } #l5> li:before {counter-increment: g1; content: counter(g1, upper-latin)". "; color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 12pt; } li {display: block; } #l6 {padding-left: 0pt;counter-reset: h1 0; } #l6> li:before {counter-increment: h1; content: counter(h1, upper-latin)". "; color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 12pt; } li {display: block; } #l7 {padding-left: 0pt;counter-reset: i1 0; } #l7> li:before {counter-increment: i1; content: counter(i1, upper-latin)". "; color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 12pt; } li {display: block; } #l8 {padding-left: 0pt;counter-reset: j1 0; } #l8> li:before {counter-increment: j1; content: counter(j1, upper-latin)". "; color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 12pt; } li {display: block; } #l9 {padding-left: 0pt;counter-reset: k1 0; } #l9> li:before {counter-increment: k1; content: counter(k1, upper-latin)". "; color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 12pt; } li {display: block; } #l10 {padding-left: 0pt;counter-reset: l1 0; } #l10> li:before {counter-increment: l1; content: counter(l1, upper-latin)". "; color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 12pt; } li {display: block; } #l11 {padding-left: 0pt;counter-reset: m1 0; } #l11> li:before {counter-increment: m1; content: counter(m1, upper-latin)". "; color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 12pt; } li {display: block; } #l12 {padding-left: 0pt;counter-reset: n1 0; } #l12> li:before {counter-increment: n1; content: counter(n1, upper-latin)". "; color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 12pt; } li {display: block; } #l13 {padding-left: 0pt;counter-reset: o1 0; } #l13> li:before {counter-increment: o1; content: counter(o1, upper-latin)". "; color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 12pt; } li {display: block; } #l14 {padding-left: 0pt;counter-reset: p1 0; } #l14> li:before {counter-increment: p1; content: counter(p1, upper-latin)". "; color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 12pt; } li {display: block; } #l15 {padding-left: 0pt;counter-reset: q1 0; } #l15> li:before {counter-increment: q1; content: counter(q1, upper-latin)". "; color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 12pt; } li {display: block; } #l16 {padding-left: 0pt;counter-reset: r1 0; } #l16> li:before {counter-increment: r1; content: counter(r1, upper-latin)". "; color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 12pt; }


Answer: A


QUESTION: 514

Which of the following performs name resolution without using fully qualified names?


  1. RAS server

  2. WINS server

  3. DHCP server

  4. NAS server


Answer: B


QUESTION: 515

An administrator has a very large network center with several rows of server racks. Which of the following could the administrator document to show the flow of information through the datacenter when customers query the corporate website?


  1. A physical server and network location diagram

  2. A logical server and network topology diagram

  3. The original server and network installation baselines

  4. A physical rack and floor plan diagram


Answer: B


QUESTION: 516

A server administrator decides to install anti-malware software to prevent outside attacks. Which of the following threats are being prevented?


  1. Software virus

  2. IPSec

  3. DDoS

  4. Network flooding


Answer: A


QUESTION: 517

A server administrator builds a disk array with data striping. Several months later, a disk fails and the server crashes. Which of the following is the problem?


  1. Data striping provides no fault tolerance.

  2. The block sizes were set incorrectly.

  3. The parity disk failed.

  4. The drive head broke off causing a cascade failure.


Answer: A


QUESTION: 518

A company requires that business critical applications must reside both onsite and offsite for disaster recovery needs. Which of the following BEST describes this scenario?


  1. A hot site

  2. A cold site

  3. Cloud computing

  4. A warm site


Answer: A


QUESTION: 519

Which of the following provides the BEST security?


  1. NTFS permissions

  2. Encryption

  3. Strong passwords

  4. Share permissions


Answer: B


QUESTION: 520

A system administrator has implemented EFS on the users’ share folders. After copying one of the files from the remote share folder on the server to the local computer, a user reports that the file is now accessible by everyone. Which of the following describes what has happened?


  1. The local computer has a third party software firewall.

  2. The latest patches have not been installed on the server.

  3. The local computer hard drive is formatted with FAT32.

  4. The server has run out of virtual memory.

Answer: C


QUESTION: 521

A KVM “Crash Cart” is used to do which of the following?


  1. Load a server into a rack to keep it from crashing.

  2. Provide emergency power.

  3. Directly manage a server.

  4. Remotely manage a server.


Answer: C


QUESTION: 522

Which of the following type of connectors is found on narrow SCSI systems? (Select TWO).


  1. DB-15

  2. Centronics 36

  3. Centronics 50

  4. IDC-50

  5. IDC-68


Answer: C, D


QUESTION: 523

Which of the following prerequisites should be met before adding a processor to a server? (Select TWO).


  1. Ensure the operating system supports multiple processors

  2. Ensure both processors have the same step codes

  3. Ensure both processors support NUMA

  4. Ensure all processes running on the server support multiple processors

  5. Ensure the OS is not using a SMP kernel


Answer: A, B


QUESTION: 524

Which of the following would be used to specify FQDN to IP address mappings locally on a server?

  1. Route command

  2. Host file

  3. LMHosts file

  4. ARP command


Answer: B


QUESTION: 525

Which of the following connects the L2 cache to the processor?


  1. PCI

  2. Frontside bus

  3. Backside bus

  4. System I/O bus


Answer: C


QUESTION: 526

An administrator is attempting to recover from a power failure in the data center. Which of the following is the BEST way to recover the servers?


  1. Bring up the WINS server, the DNS server, then the web server

  2. Bring up the web server, the time clock server, then the DHCP server

  3. Bring up the backup tape server, the DNS server, then the web server

  4. Bring up the active directory server, the DNS server, then the web server


Answer: D


QUESTION: 527

A firmware upgrade can be performed on which of the following? (Select THREE).


  1. SCSI hard drive

  2. Heat sink

  3. RAM

  4. BIOS

  5. CPU

  6. Server backplane


Answer: A, D, F

QUESTION: 528

At a minimum how many NICs must a machine have to host virtual machines?


  1. One NIC will support all virtual machines

  2. One for each virtual machine and one for management

  3. Three for each virtual machine

  4. Two for each virtual machine and one for management


Answer: A


QUESTION: 529

Which of the following can be used to manage a server’s BIOS remotely? (Select TWO).


  1. Remote desktop software

  2. Dedicated management card

  3. Telnet session

  4. IP KVM

  5. VPN


Answer: B, D


CompTIA SK0-003 Exam (CompTIA Server+ Certification) Detailed Information

SK0-003 - CompTIA Server+ Certification


SK0-003 Test Objectives


INTRODUCTION

Certification Exam Objectives: SK0-003

The CompTIA Server+ certification is an international vendor neutral credential. The CompTIA Server+ exam is a validation of “foundation” level server skills and knowledge, and is used by organizations and IT professionals around the globe.

The skills and knowledge measured by this examination are derived from an industry- wide Job Task Analysis (JTA) and were validated through a global survey in Q4, 2008. The results of the survey were used to validate the content of the subject areas (domains) and exam objectives, as well as the overall domain weightings, ensuring the importance of one domain relative to another.

The CompTIA Server+ certification is targeted towards individuals with 18-24 months of IT experience. Although not a prerequisite, it is recommended that CompTIA Server+ candidates hold a CompTIA A+ certification.

This test will certify that the successful candidate has the knowledge and skills required to build, maintain, troubleshoot and support server hardware and software technologies. The successful candidate will be able to identify environmental issues; understand and comply with disaster recovery and physical / software security procedures; be familiar with industry terminology and concepts; understand server roles / specializations and interaction within the overall computing environment.

The table below lists the domains measured by this examination and the appropriate extent to which they are represented.

Domain

% of Examination

1.0

System Hardware

21%

2.0

Software

19%

3.0

Storage

14%

4.0

IT Environment

11%

5.0

Disaster Recovery

11%

6.0

Troubleshooting

24%

Total

100%

1.0 System Hardware

  • Differentiate between system board types, features, components and their purposes.

    • Dip switches / jumpers

    • Processor (single and multi)

    • Bus types and bus speeds

    • On board components

      • NICs

      • Video

      • Audio

      • USB

      • HID

      • Serial

      • Parallel

    • Expansion slots

      • PCI

      • PCIe

      • PCIx

      • AGP

      • ISA

    • BIOS

    • Riser Card / backplane

    • Storage connectors

      • SCSI

      • SATA

      • IDE

      • Floppy

  • Deploy different chassis types and the appropriate components

    • Cooling

      • Fans

      • Water cooled

      • Passive

      • Active

      • Shroud

      • Ducts

      • Redundant cooling

      • Hot swappable

      • Ventilation

        • Form Factor (tower, rack, blade)

          • Space utilization (U size, height, width, depth)

        • Power

          • Connectors

          • Voltages

          • Phase

        • Redundant power

        • Shut off switches – chassis intrusion

        • Power buttons

        • Reset buttons

        • Diagnostic LEDs

        • Expansion bays

  • Differentiate between memory features / types and given a scenario select appropriate memory

    • Memory pairing

    • ECC vs. non ECC

    • Registered vs. non-registered

    • RAID and hot spares

    • Types

      • DDR

      • Fully buffered DIMM

      • DDR2

      • SDRAM

      • DDR3

    • Memory compatibility

      • Speed

      • Size

      • Pins

      • CAS latency

      • Timing

      • Vendor specific memory

    • On board vs. riser card

  • Explain the importance of a Hardware Compatibility List (HCL)

    • Vendor standards for hardware

    • Memory and processor compatibility

    • Expansion cards compatibility

    • Virtualization requirements

  • Differentiate between processor features / types and given a scenario select the appropriate processor

    • Multicore

    • Multiprocessor

    • Cache levels

    • Stepping

    • Speed

    • VRMs

    • Execute disable (XD) or not execute (NX)

    • Hyper-Threading

    • VT or AMD-V

    • AMD vs.Intel (non-compatible CPUs)

    • Processor architecture (RISC, CISC)

    • Vendor slot types

    • 64bit vs. 32 bit

    • Heat dissipation (heat sinks, fans, liquid cooling)

  • Given a scenario, install appropriate expansion cards into a server while taking fault tolerance into consideration.

    • Manufacturer specific

      • Fax cards

      • PBX cards

      • Camera cards

      • VoIP

        • HBAs

        • NICs

        • Video

        • Audio

        • Storage controller (SCSI, SATA, RAID)

          • SCSI low voltage / high voltage (LVD/HVD)

          • SCSI IDs

          • Cables and connectors

          • Active vs. passive termination

        • Port expansion cards

          • USB

          • IEEE 1394

          • Serial

          • Parallel

  • Install, update and configure appropriate firmware.

    • Driver / hardware compatibility

    • Implications of a failed firmware upgrade (redundant BIOS)

    • Follow manufacturer instructions and documentation

  • 2.0 Software

  • Install, deploy, configure and update NOS (Windows / *nix).

    • Installation methods (optical media, USB, network share, PXE)

      • Imaging – system cloning and deployment (Ghost, RIS/WDS, Altiris, virtualization templates)

    • Bootloader

    • File systems

      • FAT

      • FAT32

      • NTFS

      • VMFS

      • ZFS

      • EXT3

    • Driver installation

      • Driver acquisition

      • Installation methods

      • Require media

    • Configure NOS

      • Initial network

      • User

      • Device

      • Roles

      • OS environmental settings

      • Applications and tools

    • Patch management

  • Explain NOS security software and its features.

    • Software firewall

      • Port blocking

      • Application exception

      • ACL

    • Malware protection software

      • Antivirus

      • Antispyware

    • Basics of file level permissions vs. share permissions

  • Given a scenario, implement and administer NOS management features based on procedures and guidelines

    • User management

      • Add and remove users

      • Setting permissions o Group memberships o Policies

      • Logon scripts

    • Resource management

      • ACLs

      • Quotas

      • Shadow volumes

      • Disk management

      • Performance monitoring

      • Baselining

    • Monitoring (tools and agents)

      • SNMP (MIBs)

      • WBEM (WMI)

  • Explain different server roles, their purpose and how they interact

    • File and print server

    • Database server

    • Web server

    • Messaging server

    • DHCP server

    • Directory services server

    • DNS server

    • Application server

      • Update server and proxy server

      • Filtering server

      • Monitoring server

      • Dedicated

      • Distributed

      • Peer to peer

    • Remote access server

    • Virtualized services

    • NTP server

    • Explain the different between a workstation, desktop and a server

    • Server shut down and start up sequence (one server vs. multiple servers vs. attached components)

  • Summarize server virtualization concepts, features and considerations

    • Resource utilization

    • Configuration

    • Interconnectivity

    • Management server

    • Reasons for virtualization

      • Cost benefits

      • Redundancy

      • Green initiative

      • Disaster recovery

      • Testing environment

      • Ease of deployment

  • Describe common elements of networking essentials

    • TCP/IP

      • Subnetting

      • DNS

      • DHCP

      • Classes

      • Gateways

      • Static vs. dynamic

      • IP stack

      • Ports

      • Teaming/Link Aggregation

    • Ethernet

      • Types

      • Speeds

      • Cables

    • VPN

    • VLAN

    • DMZ

  • 3.0 Storage

  • Describe RAID technologies and its features and benefits

    • Hot spare

    • Software vs. hardware

    • Cache read/write levels (data loss potential)

    • Performance benefits and tradeoffs

  • Given a scenario, select the appropriate RAID level

    • 0, 1, 3, 5, 6, 10, 50

    • Performance benefits and tradeoffs

  • Install and configure different internal storage technologies

    • Hot swappable vs. non-hot swappable

    • SCSI, Ultra SCSI, Ultra320 (termination), LUNs

    • SAS, SATA

    • Tape

    • Optical

      • DVD

      • DVD-R

      • CD-ROM

      • CD-R

      • CD-RW

      • Blu-Ray

        • Flash

        • Floppy (USB)

        • Controller (firmware levels)

        • Hard drive (firmware, JBOD)

  • Summarize the purpose of external storage technologies

    • Network attached storage

    • Storage area network

    • Tape library

    • WORM

    • Optical jukebox

    • Transport media

      • iSCSI

      • SATA

      • SAS

      • SCSI

      • Fibre Channel

  • 4.0 IT Environment

  • Write, utilize and maintain documentation, diagrams and procedures

    • Follow pre-installation plan when building or upgrading servers

    • Labeling

    • Diagram server racks and environment topologies

    • Hardware and software upgrade, installation, configuration , server role and repair logs

    • Document server baseline (before and after service)

    • Original hardware configuration, service tags, asset management and warranty

    • Vendor specific documentation

      • Reference proper manuals

      • Websites

      • Support channels (list of vendors)

  • Given a scenario, explain the purpose of the following industry best practices

    • Follow vendor specific server best practices

      • Documentation

      • Tools

      • Websites

    • Explore ramifications before implementing change – determine organizational impact

    • Communicate with stakeholders before taking action and upon completion of action

    • Comply with all local laws / regulations, industry and corporate regulations

    • Purpose of Service Level Agreement (SLAs)

    • Follow change control procedures

    • Equipment disposal

  • Determine an appropriate physical environment for the server location

    • Check for adequate and dedicated power, proper amperage and voltage

      • UPS systems (check load, document service, periodic testing)

      • UPS specifications (run time, max load, bypass procedures, server communication and shut down, proper monitoring)

    • Server cooling considerations – HVAC

      • Adequate cooling in room

      • Adequate cooling in server rack

      • Temperature and humidity monitors

  • Implement and configure different methods of server access

    • KVM (local and IP based)

    • Direct connect

    • Remote management

      • Remote control

      • Administration

      • Software deployment

      • Dedicated management port

  • Given a scenario, classify physical security measures for a server location

    • Physical server security

      • Locked doors

      • Rack doors

      • CCTV

      • Mantraps

      • Security personnel

    • Access control devices (RFID, keypads, pinpads)

      • Biometric devices (fingerprint scanner, retina)

    • Security procedures

      • Limited access

      • Access logs

      • Limited hours

    • Defense in-depth – multiple layers of defense

    • Reasons for physical security

      • Theft

      • Data loss

      • Hacking

    • Secure documentation related to servers

      • Passwords

      • System configurations

      • Logs

    5.0 Disaster Recovery

  • Compare and contrast backup and restoration methodologies, media types and concepts

    • Methodologies (full, incremental, differential, selective)

      • Snapshot

      • Copy

      • Bare metal o Open file o Databases

      • Data vs. OS restore

      • Rotation and retention (grandfather, father and son)

    • Media types

      • Tape

      • Disk

      • WORM

      • Optical

      • Flash

    • Backup security and off-site storage

    • Importance of testing the backup and restoration process

  • Given a scenario, compare and contrast the different types of replication methods

    • Disk to disk

    • Server to server

      • Clustering

      • Active/active

      • Active/passive

        • Site to site

        • Site types

          • Cold site

          • Hot site

          • Warm site

          • Distance requirements

  • Explain data retention and destruction concepts

    • Awareness of potential legal requirements

    • Awareness of potential company policy requirements

    • Differentiate between archiving and backup

  • Given a scenario, carry out the following basic steps of a disaster recovery plan

    • Disaster recovery testing process

    • Follow emergency procedures (people first)

    • Use appropriate fire suppressants

    • Follow escalation procedures for emergencies

    • Classification of systems (prioritization during recovery)

  • 6.0 Troubleshooting

  • Explain troubleshooting theory and methodologies

    • Identify the problem and determine the scope

      • Question users/stakeholders and identify changes to the server / environment

      • Collect additional documentation / logs

      • If possible, replicate the problem as appropriate

      • If possible, perform backups before making changes

    • Establish a theory of probable cause (question the obvious)

      • Determine whether there is a common element of symptom causing multiple problems

    • Test the theory to determine cause

      • Once theory is confirmed determine next steps to resolve problem

      • If theory is not confirmed re-establish new theory or escalate

    • Establish a plan of action to resolve the problem and notify impacted users

    • Implement the solution or escalate as appropriate

      • Make one change at a time and test/confirm the change has resolved the problem

      • If the problem is not resolved, reverse the change if appropriate and implement new change

    • Verify full system functionality and if applicable implement preventative measures

    • Perform a root cause analysis

    • Document findings, actions and outcomes throughout the process

  • Given a scenario, effectively troubleshoot hardware problems, selecting the appropriate tools and methods

    • Common problems

      • Failed POST

      • Overheating

      • Memory failure

      • Onboard component failure

      • Processor failure

      • Incorrect boot sequence

      • Expansion card failure

      • Operating system not found

      • Drive failure

      • Power supply failure

      • I/O failure

    • Causes of common problems

      • Third party components or incompatible components

      • Incompatible or incorrect BIOS

      • Cooling failure

      • Mismatched components

      • Backplane failure

    • Environmental issues

      • Dust

      • Humidity

      • Temperature

      • Power surge / failure

    • Hardware tools

      • Power supply tester (multimeter)

      • System board tester

      • Compressed air

      • ESD equipment

  • Given a scenario, effectively troubleshoot software problems, selecting the appropriate tools and methods

    • Common problems

      • User unable to logon

      • User cannot access resources

      • Memory leak

      • BSOD / stop

      • OS boot failure

      • Driver issues

      • Runaway process

      • Cannot mount drive

      • Cannot write to system log

      • Slow OS performance

      • Patch update failure

      • Service failure

      • Hangs no shut down

      • Users cannot print

        • Cause of common problems

          • Malware

          • Unauthorized software

          • Software firewall

          • User Account Control (UAC/SUDO)

          • Improper permissions

          • Corrupted files

          • Lack of hard drive space

          • Lack of system resources

          • Virtual memory (misconfigured, corrupt)

          • Fragmentation

          • Encryption

          • Print server drivers/services

          • Print spooler

        • Software tools

          • System logs

          • Monitoring tools (resource monitor, performance monitor)

          • Defragmentation tools

  • Given a scenario, effectively diagnose network problems, selecting the appropriate tools and methods

    • Common problems

      • Internet connectivity failure

      • Email failure

      • Resource unavailable

      • DHCP server mis-configured o Non-functional or unreachable o Destination host unreachable o Unknown host

      • Default gateway mis-configured

      • Failure of service provider

      • Can reach by IP not by host name

        • Causes of common problems

          • Improper IP configuration

          • VLAN configuration

          • Port security

          • Improper subnetting

          • Component failure

          • Incorrect OS route tables

          • Bad cables

          • Firewall (mis-configuration, hardware failure, software failure)

          • Mis-configured NIC, routing / switch issues

          • DNS and/or DHCP failure

          • Mis-configured hosts file

        • Networking tools

          • ping

          • tracert / traceroute o ipconfig / ifconfig o nslookup

          • net use / mount

          • route

          • nbtstat

          • netstat

  • Given a scenario, effectively troubleshoot storage problems, selecting the appropriate tools and methods

    • Common problems

      • Slow file access

      • OS not found

      • Data not available

      • Unsuccessful backup

      • Error lights

      • Unable to mount the device

      • Drive not available

      • Cannot access logical drive

      • Data corruption

      • Slow I/O performance

      • Restore failure

      • Cache failure

      • Multiple drive failure

    • Causes of common problems

      • Media failure

      • Drive failure

      • Controller failure

      • HBA failure

      • Loose connectors o Cable problems o Mis-configuration

      • Improper termination

      • Corrupt boot sector

      • Corrupt file system table

      • Array rebuild

      • Improper disk partition

      • Bad sectors

      • Cache battery failure

      • Cache turned off

      • Insufficient space

      • Improper RAID configuration

      • Mis-matched drives

      • Backplane failure

    • Storage tools

      • Partitioning tools

      • Disk management

      • RAID array management

      • Array management

      • System logs

      • Net use / mount command

      • Monitoring tools

  • SERVER+ ACRONYMS

    *nix Unix/Linux/Solaris/OS X/BSD ACL Access Control List

    AD Active Directory

    AGP Accelerated Graphics Port

    AIT Advanced Intelligent Tape AMD-V AMD Virtualization

    ATX Advanced Technology Extended BBWC Battery-Backed Write Cache BIOS Basic Input/Output System BSOD Blue Screen of Death

    BTX Balanced Technology Extended CAS Column Address Strobe

    CIDR Classless Inter-Domain Routing CLI Command Line Interpreter

    CPU Central Processing Unit

    CRT Cathode Ray Tube (Monitor) CRU Customer Replaceable Unit CUPS Common Unix Printing System DAS Direct Attached Storage

    DAT Digital Audio Tape

    DDoS Distributed Denial of Service DC Domain Controller

    DDR Double Data Rate

    DDR2 Double Data Rate2

    DDR3 Double Data Rate3

    DHCP Dynamic Host Configuration Protocol DLT Digital Linear Tape

    DMA Direct Memory Access

    DMZ Demilitarized Zone

    DNS Domain Name Service

    DSRM Directory Services Restore Mode DTX Discontinuous Transmission EDO Extended Data Out

    EIDE Enhanced Integrated Drive Electronics

    EISA Extended Industry Standard Architecture ESD Electrostatic Discharge

    FAT File Allocation Table

    FQDN Fully Qualified Domain Name FRU Field Replaceable Unit

    FTP File Transfer Protocol

    GFS Grandfather Father Son

    GPU Graphics Processing Unit

    HBA Host Bus Adapter

    HCL Hardware Compatibility List

    HID Human Interface Device

    HTTP Hyper Text Transport Protocol

    HTTPS Secure Hyper Text Transport Protocol HVAC Heating, Ventilating and Air Conditioning HVD High Voltage Differential

    IIS Internet Information Services IMAP4 Internet Mail Access Protocol IP Internet Protocol

    IPv6 Internet Protocol Version 6

    IPMI Intelligent Platform Management Interface ISA Industry Standard Architecture

    iSCSI Internetworking Small Computer System Interface JBOD Just a bunch of disks

    KVM Keyboard-Video-Mouse

    LAN Local Area Network

    LDAP Lightweight Directory Access Protocol LKGC Last Known Good Configuration

    LOM Lights Out Management LTO Linear Tape-Open

    LUN Logical Unit Number

    LVD Low Voltage Differential

    MIB Management Information Base microBTX Micro Balanced Technology Extended miniATX Micro Advanced Technology Extended MMC Microsoft Management Console

    NAS Network Attached Storage

    NLB Network Load Balancing

    NLX New Low Profile Extended NOS Network Operating System NTFS New Technology File System NTP Network Time Protocol

    NX No Execute

    OEM Original Equipment Manufacturer OS Operating System

    OSPF Open Shortest Path First

    OTDR Optical Time Domain Reflectometer

    PATA Parallel Advanced Technology Attachment PBX Private Branch Exchange

    PCI Peripheral Component Interconnect POP3 Post Office Protocol (version 3)

    PXE Preboot Execution Environment

    RAID Redundant Array of Inexpensive/Integrated Disks/Drives RAM Random Access Memory

    RAS Remote Access Server

    RDP Remote Desktop Protocol

    RIS Remote Installation Service

    SAN Storage Area Network

    SAS Serial Attached SCSI

    SATA Serial ATA

    SCSI Small Computer System Interface

    SDRAM Synchronous Dynamic Random Access Memory SLA Service Level Agreement

    SMP Symmetric Multiprocessing SMTP Simple Mail Transport Protocol

    SNMP Simple Network Management Protocol SQL Structured Query Language

    SSH Secure Shell

    TCP/IP Transmission Control Protocol / Internet Protocol TFTP Trivial File Transfer Protocol

    TDR Time Domain Reflectometer UAC User Account Control

    UDP User Datagram Protocol

    UID Unit Identification

    USB Universal Serial Bus

    VLAN Virtual Local Area Network VM Virtual Machine

    VMFS VMWare File System VoIP Voice over IP

    VPN Virtual Private Network VRM Voltage Regulator Module VSS Volume Shadow Service

    VT Virtualization Technology

    WBEM Web-based Enterprise Management WDS Windows Deployment Services

    WMI Windows Management Instrumentation WORM Write Once Read Many

    WSUS Windows Software Update Services XD Execute Disable

    ZFS Zettabyte File System




    HGCSOFT Sitemap
    HGCSOFT PDF SITEMAP
    AT-Capital
    Top Softwares for Download
    Pass4sure
    Certification Exams Database