CompTIA Server+ (SK0-005)

Course Overview:
The CompTIA Server+ (SK0-005) certification is designed for IT professionals who want to validate their knowledge and skills in server hardware, software, storage, best practices, disaster recovery, and troubleshooting in a data center or server environment. Unlike many vendor-specific certifications, Server+ covers a broad range of server technologies, making it highly versatile for careers in IT infrastructure, systems administration, and server management.

Why We Need It:
Servers are the backbone of modern IT environments, powering businesses, websites, applications, and cloud services. Server+ ensures that IT professionals can effectively manage, maintain, and troubleshoot server systems, reducing downtime and improving operational efficiency. Organizations benefit from certified staff who understand hardware, virtualization, security, and disaster recovery.

How It Is Useful:

  • Validates skills in server architecture, installation, configuration, and maintenance.
  • Covers network storage, security, disaster recovery, and virtualization concepts.
  • Prepares professionals to handle troubleshooting and performance optimization.
  • Enhances career opportunities for roles like Server Administrator, Systems Administrator, IT Technician, and Data Center Technician.

Course Benefits:

  • Gain hands-on experience with server technologies.
  • Learn best practices for installation, upgrades, and maintenance.
  • Understand security and disaster recovery protocols for server environments.
  • Boost credibility with employers through a globally recognized certification.

Certification Details:

  • Exam Code: SK0-005
  • Format: Multiple choice and performance-based questions
  • Recommended Experience: 18–24 months of IT experience, including server support and administration
  • Renewal: CompTIA certifications typically require renewal every 3 years through continuing education (CE) or retesting.

Who Should Take This Course:
This course is ideal for IT professionals working with servers, aspiring system administrators, network engineers, or anyone who wants to gain in-depth knowledge of server technologies.

Key Skills Covered:

  • Server architecture and hardware components
  • Installation, configuration, and troubleshooting
  • Storage, virtualization, and cloud concepts
  • Security and disaster recovery
  • Best practices for maintenance and operations

EXAM DOMAINS AND WEIGHTS

Domain% of Exam
1.0 Server Hardware Installation and Management18%
2.0 Server Administration30%
3.0 Security and Disaster Recovery24%
4.0 Troubleshooting28%
Total100%

1.0 Server Hardware Installation and Management (18%)

1.1 Install Physical Hardware

1.2 Given a scenario, deploy and manage storage.

1.3 Given a scenario, perform server hardware maintenance.


2.0 Server Administration (30%)

2.1 Given a scenario, install server operating systems.

2.2 Given a scenario, configure servers to use network infrastructure services.

2.3 Given a scenario, configure and maintain server functions and features.

  • Server roles requirements
    − Print
    − Database
    − File
    − Web
    − Application
    − Messaging
    − Baselining
    ◦ Documentation
    ◦ Performance metrics
  • Directory connectivity
  • Storage management
    − Formatting
    − Connectivity
    − Provisioning
    − Partitioning
    − Page/swap/scratch
    location and size
    − Disk quotas
    − Compression
    − Deduplication
  • Monitoring
    − Uptime
    − Thresholds
    − Performance
    ◦ Memory
    ◦ Disk
    ▪ Input output operations
    per second (IOPS)
    ▪ Capacity vs. utilization
    ◦ Network
    ◦ Central processing unit (CPU)
    − Event logs
    ◦ Configuration
    ◦ Shipping
    ◦ Alerting
    ◦ Reporting
    ◦ Retention
    ◦ Rotation
  • Data migration and transfer
    − Infiltration
    − Exfiltration
    − Disparate OS data transfer
    ◦ Robocopy
    ◦ File transfer
    ◦ Fast copy
    ◦ Secure copy protocol (SCP)
  • Administrative interfaces
    − Console
    − Remote desktop
    − Secure shell (SSH)
    − Web interface

2.4 Explain the key concepts of high availability for servers.

  • Clustering
    − Active-active
    − Active-passive
    − Failover
    − Failback
    − Proper patching procedures
    − Heartbeat
  • Fault tolerance
    − Server-level redundancy vs.
    component redundancy
  • Redundant server network
    infrastructure
    − Load balancing
    ◦ Software vs. hardware
    ◦ Round robin
    ◦ Most recently used (MRU)
    − Network interface card (NIC)
    teaming and redundancy
    ◦ Failover
    ◦ Link aggregation

2.5 Summarize the purpose and operation of virtualization.

  • Host vs. guest
  • Virtual networking
    − Direct access (bridged)
    − Network address translation (NAT)
    − vNICs
    − Virtual switches
  • Resource allocation and provisioning
    − CPU
    − Memory
    − Disk
    − NIC
    − Overprovisioning
    − Scalability
  • Management interfaces
    for virtual machines
  • Cloud models
    − Public
    − Private
    − Hybrid

2.6 Summarize scripting basics for server administration.

  • Script types
    − Bash
    − Batch
    − PowerShell
    − Virtual basic script (VBS)
  • Environment variables
  • Comment syntax
  • Basic script constructs
    − Loops
    − Variables
    − Conditionals
    − Comparators
  • Basic data types
    − Integers
    − Strings
    − Arrays
  • Common server administration
    scripting tasks
    − Startup
    − Shut down
    − Service
    − Login
    − Account creation
    − Bootstrap

2.7 Explain the importance of asset management and documentation.

  • Asset management
    − Labeling
    − Warranty
    − Leased vs. owned devices
    − Life-cycle management
    ◦ Procurement
    ◦ Usage
    ◦ End of life
    ◦ Disposal/recycling
    − Inventory
    ◦ Make
    ◦ Model
    ◦ Serial number
    ◦ Asset tag
  • Documentation management
    − Updates
    − Service manuals
    − Architecture diagrams
    − Infrastructure diagrams
    − Workflow diagrams
    − Recovery processes
    − Baselines
    − Change management
    − Server configurations
    − Company policies and procedures
    ◦ Business impact analysis (BIA)
    ◦ Mean time between
    failure (MTBF)
    ◦ Mean time to recover (MTTR)
    ◦ Recovery point objective (RPO)
    ◦ Recovery time objective (RTO)
    ◦ Service level agreement (SLA)
    Uptime requirements
  • Document availability
  • Secure storage of sensitive
    documentation

2.8 Explain licensing concepts.

  • Models
    − Per-instance
    − Per-concurrent user
    − Per-server
    − Per-socket
    − Per-core
    − Site-based
    − Physical vs. virtual
    − Node-locked
    − Signatures
  • Open source
  • Subscription
  • License vs. maintenance
    and support
  • Volume licensing
  • License count validation
    − True up
  • Version compatibility
    − Backward compatible
    − Forward compatible

3.0 Security and Disaster Recovery (24%)

3.1 Summarize data security concepts.

  • Encryption paradigms
    − Data at rest
    − Data in transit
  • Retention policies
  • Data storage
    − Physical location storage
    − Off-site vs. on-site
  • UEFI/BIOS passwords
  • Bootloader passwords
  • Business impact
    − Data value prioritization
    − Life-cycle management
    − Cost of security vs. risk
    and/or replacement

3.2 Summarize physical security concepts.

  • Physical access controls
    − Bollards
    − Architectural reinforcements
    ◦ Signal blocking
    ◦ Reflective glass
    ◦ Datacenter camouflage
    − Fencing
    − Security guards
    − Security cameras
    − Locks
    ◦ Biometric
    ◦ Radio frequency
    identification (RFID)
    ◦ Card readers
    − Access control vestibules
    − Safes
  • Environmental controls
    − Fire suppression
    − Heating, ventilation, and
    cooling (HVAC)
    − Sensors

3.3 Explain important concepts pertaining to identity and access management for server
administration.

  • User accounts
  • User groups
  • Password policies
    − Length
    − Lockout
    − Enforcement
  • Permissions and access controls
    − Role-based
    − Rule-based
    − Scope based
    − Segregation of duties
    − Delegation
  • Auditing
    − User activity
    − Logins
    − Group memberships
    − Deletions
  • Multifactor authentication (MFA)
    − Something you know
    − Something you have
    − Something you are
  • Single sign-on (SSO)

3.4 Explain data security risks and mitigation strategies.

  • Security risks
    − Hardware failure
    − Malware
    − Data corruption
    − Insider threats
    − Theft
    ◦ Data loss prevention (DLP)
    ◦ Unwanted duplication
    ◦ Unwanted publication
    − Unwanted access methods
    ◦ Backdoor
    ◦ Social engineering
    − Breaches
    ◦ Identification
    ◦ Disclosure
  • Mitigation strategies
    − Data monitoring
    − Log analysis
    ◦ Security information and
    event management (SIEM)
    − Two-person integrity
    ◦ Split encryption keys tokens
    ◦ Separation of roles
    − Regulatory constraints
    ◦ Governmental
    ◦ Individually privileged information
    ▪ Personally identifiable
    information (PII)
    ▪ Payment Card Industry Data
    Security Standard (PCI DSS)
    − Legal considerations
    ◦ Data retention
    ◦ Subpoenas

3.5 Given a scenario, apply server hardening methods.

  • OS hardening
  • − Disable unused services
  • − Close unneeded ports
  • − Install only required software
  • − Apply driver updates
  • − Apply OS updates
  • − Firewall configuration
  • Application hardening
    − Install latest patches
    − Disable unneeded services,
    roles, or features
  • Host security
    − Antivirus
    − Anti-malware
    − Host intrusion detection
    system (HIDS)/Host intrusion
    prevention system (HIPS)
  • Hardware hardening
    − Disable unneeded hardware
    − Disable unneeded physical
    ports, devices, or functions
    − Set BIOS password
    − Set boot order
  • Patching
    − Testing
    − Deployment
    − Change management

3.6 Summarize proper server decommissioning concepts.

  • Proper removal procedures
    − Company policies
    − Verify non-utilization
    − Documentation
    գ Asset management
    գ Change management
  • Media destruction
    − Disk wiping
    − Physical
    գ Degaussing
    գ Shredding
    գ Crushing
    գ Incineration
    − Purposes for media destruction
  • Media retention requirements
  • Cable remediation
    − Power
    − Networking
  • Electronics recycling
    − Internal vs. external
    − Repurposing

3.7 Explain the importance of backups and restores.

  • Backup methods
    − Full
    − Synthetic full
    − Incremental
    − Differential
    − Archive
    − Open file
    − Snapshot
  • Backup frequency
  • Media rotation
  • Backup media types
    − Tape
    − Cloud
    − Disk
    − Print
  • File-level vs. system-state backup
  • Restore methods
    − Overwrite
    − Side by side
    − Alternate location path
  • Backup validation
    − Media integrity
    − Equipment
    − Regular testing intervals
  • Media inventory before restoration

3.8 Explain the importance of disaster recovery.

  • Site types
    − Hot site
    − Cold site
    − Warm site
    − Cloud
    − Separate geographic locations
  • Replication
    − Constant
    − Background
    − Synchronous vs. asynchronous
    − Application consistent
    − File locking
    − Mirroring
    − Bidirectional
  • Testing
    − Tabletops
    − Live failover
    − Simulated failover
    − Production vs. non-production

4.0 Troubleshooting (28%)

4.1 Explain the troubleshooting theory and methodology.

  • Identify the problem and
    determine the scope.
    − Question users/stakeholders
    and identify changes to the
    server/environment.
    − Collect additional
    documentation/logs.
    − If possible, replicate the
    problem as appropriate.
    − If possible, perform backups
    before making changes.
    − Escalate, if necessary.
  • Establish a theory of probable
    cause (question the obvious).
    − Determine whether there is a
    common element or symptom
    causing multiple problems.
  • Test the theory to
    determine the cause.
    − Once the theory is confirmed,
    determine the next steps
    to resolve the problem.
    − If the theory is not confirmed,
    establish a new theory.
  • Establish a plan of action
    to resolve the problem.
    − Notify impacted users.
  • Implement the solution or escalate.
    − Make one change at a time
    and test/confirm the change
    has resolved the problem.
    − If the problem is not resolved,
    reverse the change, if appropriate,
    and implement a new change.
  • Verify full system functionality
    and, if applicable, implement
    preventive measures.
  • Perform a root cause analysis.
  • Document findings, actions, and
    outcomes throughout the process.

4.2 Given a scenario, troubleshoot common hardware failures.

  • Common problems
    − Predictive failures
    − Memory errors and failures
    ◦ System crash
    ▪ Blue screen
    ▪ Purple screen
    ▪ Memory dump
    ◦ Utilization
    ◦ Power-on self-test (POST) errors
    ◦ Random lockups
    ◦ Kernel panic
    − Complementary metaloxide-semiconductor
    (CMOS) battery failure
    − System lockups
    − Random crashes
    − Fault and device indication
    ◦ Visual indicators
    − Light-emitting diode (LED)
    − Liquid crystal display
    (LCD) panel readouts
    ◦ Auditory or olfactory cues
    ◦ POST codes
    − Misallocated virtual resources
  • Causes of common problems
    − Technical
    ◦ Power supply fault
    ▪ Malfunctioning fans
    ▪ Improperly seated heat sink
    ▪ Improperly seated cards
    ▪ Incompatibility of components
    ▪ Cooling failures
    ▪ Backplane failure
    ▪ Firmware incompatibility
    ▪ CPU or GPU overheating
    − Environmental
    ◦ Dust
    ◦ Humidity
    ◦ Temperature
  • Tools and techniques
    − Event logs
    − Firmware upgrades or downgrades
    − Hardware diagnostics
    − Compressed air
    − Electrostatic discharge
    (ESD) equipment
    − Reseating or replacing
    components and/or cables

4.3 Given a scenario, troubleshoot storage problems.

  • Common problems
    − Boot errors
    − Sector block errors
    − Cache battery failure
    − Read/write errors
    − Failed drives
    − Page/swap/scratch file or partition
    − Partition errors
    − Slow file access
    − OS not found
    − Unsuccessful backup
    − Unable to mount the device
    − Drive not available
    − Cannot access logical drive
    − Data corruption
    − Slow I/O performance
    − Restore failure
    − Cache failure
    − Multiple drive failure
  • Causes of common problems
    − Disk space utilization
    գ Insufficient disk space
    − Misconfigured RAID
    − Media failure
    − Drive failure
    − Controller failure
    − Host bus adapter (HBA) failure
    − Loose connectors
    − Cable problems
    − Misconfiguration
    − Corrupt boot sector
    − Corrupt filesystem table
    − Array rebuild
    − Improper disk partition
    − Bad sectors
    − Cache battery failure
    − Cache turned off
    − Insufficient space
    − Improper RAID configuration
    − Mismatched drives
    − Backplane failure
  • Tools and techniques
    − Partitioning tools
    − Disk management
    − RAID and array management
    − System logs
    − Disk mounting commands
    ◦ net use
    ◦ mount
    − Monitoring tools
    − Visual inspections
    − Auditory inspection

4.4 Given a scenario, troubleshoot common OS and software problems.

  • Common problems
    − Unable to log on
    − Unable to access resources
    − Unable to access files
    − System file corruption
    − End of life/end of support
    − Slow performance
    − Cannot write to system logs
    − Service failures
    − System or application hanging
    − Freezing
    − Patch update failure
  • Causes of common problems
    − Incompatible drivers/modules
    − Improperly applied patches
    − Unstable drivers or software
    − Server not joined to domain
    − Clock skew
    − Memory leaks
    − Buffer overrun
    − Incompatibility
    ◦ Insecure dependencies
    ◦ Version management
    ◦ Architecture
    − Update failures
    − Missing updates
    − Missing dependencies
    − Downstream failures due to updates
    − Inappropriate applicationlevel permissions
    − Improper CPU affinity and priority
  • OS and software tools
    and techniques
    − Patching
    ◦ Upgrades
    ◦ Downgrades
    − Package management
    − Recovery
    ◦ Boot options
    ▪ Safe mode
    ▪ Single user mode
    ◦ Reload OS
    ◦ Snapshots
    − Proper privilege escalations
    ◦ runas/Run As
    ◦ sudo
    ◦ su
    − Scheduled reboots
    − Software firewalls
    ◦ Adding or removing ports
    ◦ Zones
    − Clocks
    ◦ Network time protocol (NTP)
    ◦ System time
    − Services and processes
    ◦ Starting
    ◦ Stopping
    ◦ Status identification
    ◦ Dependencies
    − Configuration management
    ◦ System center configuration
    manager (SCCM)
    ◦ Puppet/Chef/Ansible
    ◦ Group Policy Object (GPO)
    − Hardware compatibility list (HCL)

4.5 Given a scenario, troubleshoot network connectivity issues.

  • Common problems
    − Lack of Internet connectivity
    − Resource unavailable
    − Receiving incorrect
    DHCP information
    − Non-functional or unreachable
    − Destination host unreachable
    − Unknown host
    − Unable to reach remote subnets
    − Failure of service provider
    − Cannot reach server by hostname/
    fully qualified domain name (FQDN)
  • Causes of common problems
    − Improper IP configuration
    − IPv4 vs. IPv6 misconfigurations
    − Improper VLAN configuration
    − Network port security
    − Component failure
    − Incorrect OS route tables
    − Bad cables
    − Firewall (misconfiguration,
    hardware failure, software failure)
    − Misconfigured NIC
    − DNS and/or DHCP failure
    − DHCP server misconfigured
    − Misconfigured hosts file
  • Tools and techniques
    − Check link lights
    − Confirm power supply
    − Verify cable integrity
    − Check appropriate cable selection
    − Commands
    ◦ ipconfig
    ◦ ip addr
    ◦ ping
    ◦ tracert
    ◦ traceroute
    ◦ nslookup
    ◦ netstat
    ◦ dig
    ◦ telnet
    ◦ nc
    ◦ nbtstat
    ◦ route

4.6 Given a scenario, troubleshoot security problems.

  • Common concerns
    − File integrity
    − Improper privilege escalation
    ◦ Excessive access
    − Applications will not load
    − Cannot access network fileshares
    − Unable to open files
  • Causes of common problems
    − Open ports
    − Services
    ◦ Active
    ◦ Inactive
    ◦ Orphan/zombie
    − Intrusion detection configurations
    − Anti-malware configurations
    − Improperly configured
    local/group policies
    − Improperly configured firewall rules
    − Misconfigured permissions
    − Virus infection
    − Malware
    − Rogue processes/services
    − Data loss prevention (DLP)
  • Security tools
    − Port scanners
    − Sniffers
    − Telnet clients
    − Anti-malware
    − Antivirus
    − File integrity
    ◦ Checksums
    ◦ Monitoring
    ◦ Detection
    ◦ Enforcement
    − User access controls
    ◦ SELinux
    ◦ User account control (UAC)

Leave a Reply

Your email address will not be published. Required fields are marked *

Buy Me a Coffee