SK0-004 CompTIA Server+ Exam Syllabus

Server+ PDF, SK0-004 Dumps, SK0-004 PDF, Server+ VCE, SK0-004 Questions PDF, CompTIA SK0-004 VCE, CompTIA Server Plus Dumps, CompTIA Server Plus PDFUse this quick start guide to collect all the information about CompTIA Server+ (SK0-004) certification exam. This study guide provides a list of objectives and resources that will help you prepare for items on the SK0-004 Server+ exam. The Sample Questions will help you identify the type and difficulty level of the questions and the Practice Exams will make you familiar with the format and environment of an exam. You should refer this guide carefully before attempting your actual CompTIA Server Plus certification exam.

The CompTIA Server+ certification is mainly targeted to those candidates who want to build their career in Server Management domain. The CompTIA Server+ exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of CompTIA Server Plus.

CompTIA Server+ Exam Summary:

Exam Name CompTIA Server+
Exam Code SK0-004
Exam Price $319 (USD)
Duration 90 mins
Number of Questions 100
Passing Score 750 / 900
Schedule Exam CompTIA Marketplace
Sample Questions CompTIA Server+ Sample Questions
Practice Exam CompTIA SK0-004 Certification Practice Exam

CompTIA SK0-004 Exam Syllabus Topics:

Topic Details
Server Architecture 12%
Explain the purpose and function of server form factors. 1. Rack mount
  1. Dimensions
  2. 1U, 2U, 4U
  3. Cable management arms
  4. Rail kits
2. Tower
3. Blade technology
  1. Blade enclosure
  2. Backplane/midplane
  3. Power supply sockets
  4. Network modules/switches
  5. Management modules
  6. Blade server
Given a scenario, install, configure and maintain server components. 1. CPU
  1. Multiprocessor vs. multicore
  2. Socket type
  3. Cache levels: L1, L2, L3
  4. Speeds
  5. Core
  6. Bus
  7. Multiplier
  8. CPU stepping
  9. Architecture
  10. x86
  11. x64
  12. ARM
2. RAM
  1. ECC vs. non-ECC
  2. DDR2, DDR3
  3. Number of pins
  4. Static vs. dynamic
  5. Module placement
  6. CAS latency
  7. Timing
  8. Memory pairing
3. Bus types, bus channels and expansion slots
  1. Height differences and bit rate differences
  2. PCI
  3. PCIe
  4. PCI-X
4. NICs
5. Hard drives
6. Riser cards
7. RAID controllers
8. BIOS/UEFI
CMOS battery
9. Firmware
10. USB interface/port
11. Hotswap vs. non-hotswap components
Compare and contrast power and cooling components. 1. Power
  1. Voltage
  2. 110v vs. 220v vs. -48v
  3. 208v vs. 440v/460v/480v
  4. Wattage
  5. Consumption
  6. Redundancy
  7. 1-phase vs. 3-phase power
  8. Plug types
  9. NEMA
  10. Edison
  11. Twist lock
2. Cooling
  1. Airflow
  2. Thermal dissipation
  3. Baffles/shrouds
  4. Fans
  5. Liquid cooling
Server Administration 24%
Install and configure server operating systems. 1. Determine server role/purpose
2. Update firmware
3. BIOS/UEFI configuration
  1. Boot order

4. Disk preparation

  1. RAID setup
  2. Partitioning
  3. Formatting
  4. File system type
  5. Ext 2, 3, 4
  6. NTFS
  7. FAT32
  8. ReiserFS
  9. UFS
  10. VMFS
  11. ZFS
  12. Swap
5. Configure host name
6. Local account setup
7. Connect to network
8. Join domain/directory
9. Address security concerns
  1. Patching
  2. OS hardening
  3. Compliance to company procedures/standards
10. Enable services
11. Install features/roles/applications/drivers
12. Performance baseline
  1. Server optimization
  2. Swap or pagefile optimization
13. Unattended/remote installations
  1. Deploying images and cloning
  2. Scripted installs
  3. PXE boot
  4. TFTP
Compare and contrast server roles and requirements for each. 1. Web server
2. Application server
3. Directory server
4. Database server
5. File server
6. Print server
7. Messaging server
8. Mail server
9. Routing and remote access server
10. Network services server
  1. DHCP
  2. DNS/WINS
  3. NTP
Given a scenario, use access and control methods to administer a server. 1. Local hardware administration
  1. KVM
  2. Serial
  3. Virtual administration console
2. Network-based hardware administration
  1. KVM over IP
  2. ILO
  3. iDRAC
3. Network-based operating system administration
  1. RDP
  2. SSH
  3. VNC
  4. Command line/shell
Given a scenario, perform proper server maintenance techniques. 1. Change management
2. Patch management
  1. Operating system updates
  2. Application updates
  3. Security software updates
  4. Firmware updates
  5. Device drivers updates
  6. Compatibility lists
  7. Operating systems
  8. Hardware
  9. Applications
  10. Testing and validation
3. Outages and service level agreements
  1. Scheduled downtime
  2. Unscheduled downtime
  3. Impact analysis
  4. Client notification
  5. MTTR
4. Performance monitoring
  1. CPU utilization
  2. Memory utilization
  3. Network utilization
  4. Disk utilization
  5. Disk IOPS
  6. Storage capacity
  7. Comparison against performance baseline
  8. Processes and services monitoring
  9. Log monitoring
5. Hardware maintenance
  1. Check system health indicators
  2. LEDs
  3. Error codes
  4. Beep codes
  5. LCD messages
  6. Replace failed components
  7. Fans
  8. Hard drives
  9. RAM
  10. Backplanes
  11. Batteries
  12. Preventive maintenance
  13. Clearing dust
  14. Check proper air flow
  15. Proper shut down procedures
6. Fault tolerance and high availability techniques
  1. Clustering
  2. Active/active
  3. Active/passive
  4. Load balancing
  5. Round robin
  6. Heartbeat
Explain the importance of asset management and documentation. 1. Asset management
  1. Licensing
  2. Labeling
  3. Warranty
  4. Life cycle management
  5. Procurement
  6. Usage
  7. End of life
  8. Disposal/recycling
  9. Inventory
  10. Make
  11. Model
  12. Serial number
  13. Asset tag
2. Documentation
  1. Service manuals
  2. Network diagrams
  3. Architecture diagrams
  4. Dataflow diagrams
  5. Recovery documentation
  6. Baseline documentation
  7. Change management policies
  8. Service level agreement
  9. Server configuration
3. Secure storage of sensitive documentation
Explain the purpose and operation of virtualization components. 1. Hosts and guests
2. Management interface for virtual machines
3. Hypervisor
  1. Type I
  2. Type II
  3. Hybrid
4. Hardware compatibility list
  1. BIOS/UEFI compatibility and support
  2. CPU compatibility support
  3. AMD-V/Intel VT
5. Resource allocation between guest and host
CPU
Storage
Memory
Network connectivity
Direct access (bridging) vs. NAT
Virtual NICs
Virtual switches
Video
Storage 12%
Given a scenario, install and deploy primary storage devices based on given specifications and interfaces.
1. Disk specifications
  1. RPM
  2. Dimensions/form factor
  3. Capacity
  4. Bus width
  5. IOPS
  6. Seek time and latency
  7. Hotswap vs. non-hotswap components
2. Interfaces
  1. SAS
  2. SATA
  3. SCSI
  4. USB
  5. Fibre channel
3. Hard drive vs. SSD
Given a scenario, configure RAID using best practices. 1. RAID levels and performance considerations
  1. 0
  2. 1
  3. 5
  4. 6
  5. 10
2. Software vs. hardware RAID
  1. Performance considerations 

3. Configuration specifications

  1. Capacity
  2. Bus types
  3. Drive RPM
4. Hotswap support and ramifications
5. Hot spare vs. cold spare
6. Array controller
  1. Memory
  2. Battery backed cache
  3. Redundant controller
Summarize hardware and features of various storage technologies. 1. DAS
2. NAS
  1. CIFS/SMB
  2. NFS
3. SAN
  1. iSCSI
  2. FCoE
  3. Fibre channel
  4. LUN and LUN masking
  5. HBAs and fabric switches
4. JBOD
5. Tape
  1. Drive
  2. Libraries
6. Optical drive
7. Flash, compact flash and USB drive
Given a scenario, calculate appropriate storage capacity and plan for future growth.
1. Base10 vs. Base2 disk size calculation (1000 vs. 1024)
2. Disk quotas
3. Compression
4. Capacity planning considerations
  1. Operating system growth
  2. Patches
  3. Service packs
  4. Log files
  5. Temporary directories
  6. Databases
  7. Application servers
  8. File servers
  9. Archival
Security 13%
Compare and contrast physical security methods and concepts. 1. Multifactor authentication
  1. Something you have
  2. Something you know
  3. Something you are
2. Security concepts
  1. Mantrap
  2. RFID chip
  3. ID card
  4. Biometric
  5. Keypad
  6. Access list
  7. Security guard
  8. Security camera
  9. Keys and locks
  10. Cabinet
  11. Rack mount
  12. Server
  13. Safe
Given a scenario, apply server hardening techniques. 1. OS hardening
  1. Stopping unneeded services/ closing unneeded ports
  2. Install only required software
  3. Install latest operating system patches
2. Application hardening
  1. Install latest patches
  2. Disabling unneeded services/roles/features
3. Endpoint security
  1. HIDS
  2. Anti-malware
4. Remediate security issues based on a vulnerability scan
5. Hardware hardening
  1. Disabling unneeded hardware and physical ports/devices
  2. BIOS password
  3. Disable WOL (Wake on LAN)
  4. Setup boot order
  5. Chassis locks/intrusion detection
Explain basic network security systems and protocols. 1. Firewall
  1. Network-based
  2. Host-based
2. Port security/802.1x/NAC
3. Router access list
4. NIDS
5. Authentication protocols
  1. LDAP
  2. RADIUS
  3. TACACS
  4. TACACS+
6. PKI
  1. Private key
  2. Public key
  3. Certificate authority
  4. SSL/TLS
7. VPN
8. IPSec
9.  VLAN
10. Security zones
  1. DMZ
  2. Public and private
  3. Intranet and extranet
Implement logical access control methods based on company policy. 1. ACLs
  1. Users
  2. Groups
  3. Roles
  4. Resources
  5. File system
  6. Network ACLs
  7. Peripheral devices
  8. Administrative rights
  9. Distribution lists
2. Permissions
  1. Read
  2. Write/modify
  3. Execute
  4. Delete
  5. Full control/superuser
  6. File vs. share
Implement data security methods and secure storage disposal techniques.
1. Storage encryption
  1. File level encryption
  2. Disk encryption
  3. Tape encryption
2. Storage media
  1. Soft wipe
  2. File deletion
  3. Hard wipe
  4. Zero out all sectors
  5. Physical destruction
  6. Remote wipe
Given a scenario, implement proper environmental controls and techniques.
1. Power concepts and best practices
  1. UPS
  2. Runtime vs. capacity
  3. Automated graceful shutdown of attached devices
  4. Periodic testing of batteries
  5. Maximum load
  6. Bypass procedures
  7. Remote management
  8. PDU
  9. Connect redundant rack
  10. PDUs to separate circuits
  11. Capacity planning
  12. PDU ratings
  13. UPS ratings
  14. Total potential power draw
  15. Multiple circuits
  16. Connect redundant power supplies to separate PDUs
2. Safety
  1. ESD procedures
  2. Fire suppression
  3. Proper lifting techniques
  4. Rack stability
  5. Floor load limitations
  6. Sharp edges and pinch points
3. HVAC
  1. Room and rack temperature and humidity
  2. Monitoring and alert notifications
  3. Air flow
  4. Rack filler/baffle/blanking panels
  5. Hot aisle and cold aisle
Networking 10%
Given a scenario, configure servers to use IP addressing and network infrastructure services.
1.  IPv4 vs. IPv6
2. Default gateway
3. CIDR notation and subnetting
4. Public and private IP addressing
5. Static IP assignment vs. DHCP
6. DNS
  1. FQDN
  2. Default domain suffix/search domain
7. WINS
8. NetBIOS
9. NAT/PAT
10. MAC addresses
11. Network Interface Card configuration
  1. NIC teaming
  2. Duplexing
  3. Full
  4. Half
  5. Auto
  6. Speeds
  7. 10/100/1000 Mbps
  8. 10 Gbps
Compare and contrast various ports and protocols. 1. TCP vs. UDP
2. SNMP 161
3. SMTP 25
4. FTP 20/21
5.  SFTP 22
6.  SSH 22
7. SCP 22
8. NTP 123
9. HTTP 80
10. HTTPS 443
11. TELNET 23
12. IMAP 143
13. POP3 110
14. RDP 3389
15. FTPS 989/990
16. LDAP 389/3268
17. DNS 53
18. DHCP 67/68
Given a scenario, install cables and implement proper cable management procedures.
1. Copper
  1. Patch cables
  2. Crossover
  3. Straight through
  4. Rollover
  5. CAT5
  6. CAT5e
  7. CAT6
2. Fiber
  1. Single mode
  2. Multimode
3. Connectors
  1. ST
  2. LC
  3. BNC
  4. SC
  5. SFP
  6. RJ-45
  7. RJ-11
4. Cable placement and routing
  1. Cable channels
  2. Cable management trays
  3. Vertical
  4. Horizontal
5. Labeling
6. Bend radius
7. Plenum cables
8. Cable ties
Disaster Recovery 9%
Explain the importance of disaster recovery principles. 1. Site types
  1. Hot site
  2. Cold site
  3. Warm site
2. Replication methods
  1. Disk-to-disk
  2. Server-to-server
  3. Site-to-site
3. Continuity of operations
  1. Disaster recovery plan
  2. Business continuity plan
  3. Business impact analysis
  4. Who is affected
  5. What is affected
  6. Severity of impact
Given a scenario, implement appropriate backup techniques. 1. Methodology
  1. Full/normal
  2. Copy
  3. Incremental
  4. Differential
  5. Snapshot
  6. Selective
  7. Bare metal
  8. Open file
  9. Data vs. OS restore
2. Backup media
  1. Linear access
  2. Tape
  3. Random access
  4. Disk
  5. Removable media
  6. Optical media
3. Media and restore best practices
  1. Labeling
  2. Integrity verification
  3. Test restorability
  4. Tape rotation and retention
4. Media storage location
  1. Offsite
  2. Onsite
  3. Security considerations
  4. Environmental considerations
Troubleshooting 20%
Explain troubleshooting theory and methodologies. 1. Identify the problem and determine the scope
  1. Question users/stakeholders and identify changes to the server/environment
  2. Collect additional documentation/logs
  3. If possible, replicate the problem as appropriate
  4. If possible, perform backups before making changes
2. Establish a theory of probable cause (question the obvious)
  1. Determine whether there is a common element of symptom causing multiple problems
3. Test the theory to determine cause
  1. Once theory is confirmed, determine next steps to resolve problem
  2. If theory is not confirmed, establish new theory or escalate
4. Establish a plan of action to resolve the problem and notify impacted users
5. Implement the solution or escalate as appropriate
  1. Make one change at a time and test/ confirm the change has resolved the problem
  2. If the problem is not resolved, reverse the change if appropriate and implement new change
6. Verify full system functionality and if applicable implement preventative measures
7. Perform a root cause analysis
8. Document findings, actions and outcomes throughout the process
Given a scenario, effectively troubleshoot hardware problems, selecting the appropriate tools and methods.
1. Common problems
  1. Failed POST
  2. Overheating
  3. Memory failure
  4. Onboard component failure
  5. Processor failure
  6. Incorrect boot sequence
  7. Expansion card failure
  8. Operating system not found
  9. Drive failure
  10. Power supply failure
  11. I/O failure
2. Causes of common problems
  1. Third-party components or incompatible components
  2. Incompatible or incorrect BIOS
  3. Cooling failure
  4. Mismatched components
  5. Backplane failure
3. Environmental issues
  1. Dust
  2. Humidity
  3. Temperature
  4. Power surge/failure
4. Hardware tools
  1. Power supply tester (multimeter)
  2. Hardware diagnostics
  3. Compressed air
  4. ESD equipment
Given a scenario, effectively troubleshoot software problems, selecting the appropriate tools and methods.
1. Common problems
  1. User unable to log on
  2. User cannot access resources
  3. Memory leak
  4. BSOD/stop
  5. OS boot failure
  6. Driver issues
  7. Runaway process
  8. Cannot mount drive
  9. Cannot write to system log
  10. Slow OS performance
  11. Patch update failure
  12. Service failure
  13. Hangs no shut down
  14. Users cannot print
2. Cause of common problems
  1. User Account Control (UAC/SUDO)
  2. Corrupted files
  3. Lack of hard drive space
  4. Lack of system resources
  5. Virtual memory (misconfigured, corrupt)
  6. Fragmentation
  7. Print server drivers/services
  8. Print spooler
3. Software tools
  1. System logs
  2. Monitoring tools (resource monitor, performance monitor)
  3. Defragmentation tools
  4. Disk property tools (usage, free space, volume or drive mapping)
Given a scenario, effectively diagnose network problems, selecting the appropriate tools and methods.
1. Common problems
  1. Internet connectivity failure
  2. Email failure
  3. Resource unavailable
  4. DHCP server misconfigured
  5. Non-functional or unreachable
  6. Destination host unreachable
  7. Unknown host
  8. Default gateway misconfigured
  9. Failure of service provider
  10. Cannot reach by host name/FQDN
2. Causes of common problems
  1. Improper IP configuration
  2. VLAN configuration
  3. Port security
  4. Improper subnetting
  5. Component failure
  6. Incorrect OS route tables
  7. Bad cables
  8. Firewall (misconfiguration, hardware failure, software failure)
  9. Misconfigured NIC, routing/switch issues
  10. DNS and/or DHCP failure
  11. Misconfigured hosts file
  12. IPv4 vs. IPv6 misconfigurations
3. Networking tools
  1. ping
  2. tracert/traceroute
  3. ipconfig/ifconfig
  4. nslookup
  5. net use/mount
  6. route
  7. nbtstat
  8. netstat
Given a scenario, effectively troubleshoot storage problems, selecting the appropriate tools and methods.
1. Common problems
  1. Slow file access
  2. OS not found
  3. Data not available
  4. Unsuccessful backup
  5. Error lights
  6. Unable to mount the device
  7. Drive not available
  8. Cannot access logical drive
  9. Data corruption
  10. Slow I/O performance
  11. Restore failure
  12. Cache failure
  13. Multiple drive failure
2. Causes of common problems
  1. Media failure
  2. Drive failure
  3. Controller failure
  4. HBA failure
  5. Loose connectors
  6. Cable problems
  7. Misconfiguration
  8. Improper termination
  9. Corrupt boot sector
  10. Corrupt file system table
  11. Array rebuild
  12. Improper disk partition
  13. Bad sectors
  14. Cache battery failure
  15. Cache turned off
  16. Insufficient space
  17. Improper RAID configuration
  18. Mismatched drives
  19. Backplane failure
3. Storage tools
  1. Partitioning tools
  2. Disk management
  3. RAID array management
  4. Array management
  5. System logs
  6. Net use/mount command
  7. Monitoring tools
Given a scenario, effectively diagnose security issues, selecting the appropriate tools and methods.
1. Common problems
  1. File integrity issue
  2. Privilege escalation
  3. Applications will not load
  4. Cannot access network file/shares
  5. Unable to open files
  6. Excessive access
  7. Excessive memory utilization
2. Causes of common problems
  1. Open ports
  2. Active services
  3. Inactive services
  4. Intrusion detection configurations
  5. Anti-malware configurations
  6. Local/group policies
  7. Firewall rules
  8. Misconfigured permissions
  9. Virus infection
  10. Rogue processes/services
3. Security tools
  1. Port scanners
  2. Sniffers
  3. Cipher
  4. Checksums
  5. Telnet client
  6. Anti-malware

To ensure success in CompTIA Server Plus certification exam, we recommend authorized training course, practice test and hands-on experience to prepare for Server+ (SK0-004) exam.

Rating: 4.9 / 5 (35 votes)