Book Image

CompTIA Server+ Certification Guide

By : Ron Price
Book Image

CompTIA Server+ Certification Guide

By: Ron Price

Overview of this book

CompTIA Server+ Certification is one of the top 5 IT certifications that is vendor neutral.System administrators opt for CompTIA server+ Certification to gain advanced knowledge of concepts including troubleshooting and networking. This book will initially start with the configuration of a basic network server and the configuration for each of its myriad roles. The next set of chapters will provide an overview of the responsibilities and tasks performed by a system administrator to manage and maintain a network server. Moving ahead, you will learn the basic security technologies, methods, and procedures that can be applied to a server and its network. Next, you will cover the troubleshooting procedures and methods in general, and specifically for hardware, software, networks, storage devices, and security applications. Toward the end of this book, we will cover a number of troubleshooting and security mitigation concepts for running admin servers with ease. This guide will be augmented by test questions and mock papers that will help you obtain the necessary certification. By the end of this book, you will be in a position to clear Server+ Certification with ease.
Table of Contents (28 chapters)
Free Chapter
1
Section 1: System Architecture
8
Section 2: Administration
13
Section 3: Security
17
Section 4: Troubleshooting
25
Glossary
0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
Z

Questions

  1. Which of the following is not a commonly used identification factor of access control?
    1. Group
    2. Role or assignment
    3. Application type
    4. Computer name
  1. The permissions and rights assigned to a specific user or group are defined in what element?
    1. ACL
    2. ACX
    3. ACE
    4. ACR
  1. The application of a cryptographic algorithm to data for the purpose of restricting access to its content is what?
    1. Confidentiality
    2. Authentication
    3. Authorization
    4. Encryption
  1. Which of the following is a method for removing data from a disk drive?
    1. Delete
    2. Wipe
    3. Erase
    4. Shred
    5. All the above
    6. None of the above
  1. Which of the following describes the status of any data on a disk drive after formatting?
    1. Unrecoverable
    2. Destroyed
    3. Recoverable
    4. Unreadable
  1. What is the objective of hardening a system or device?
    1. Extending service life
    2. Strengthening its case
    3. Reducing vulnerability
    4. Taking it offline
  1. Application hardening...