CompTIA Cloud+ CV0-003 Exam Cram
Pearson IT Certification
978-0-13-739325-1 (ISBN)
- Titel z.Zt. nicht lieferbar
- Versandkostenfrei
- Auch auf Rechnung
- Artikel merken
Covers the critical information needed to score higher on your Cloud+ CV0-003 exam!
Understand Cloud architecture and design
Secure a network in a Cloud environment
Apply data security and compliance controls and implement measures to meet security requirements
Deploy Cloud networking solutions
Perform Cloud migrations
Optimize and maintain efficient operation of a Cloud environment
Understand disaster recovery tasks
Troubleshoot security, deployment, connectivity, and other performance issues
Prepare for your exam with Pearson Test Prep
Realistic practice questions and answers
Comprehensive reporting and feedback
Customized testing in study, practice exam, or flash card modes
Complete coverage of Cloud+ CV0-003 exam objectives
At the impressionable age of 14, William “Bo” Rothwell crossed paths with a TRS-80 Micro Computer System (affectionately known as a “Trash 80”). Soon after, the adults responsible for Bo made the mistake of leaving him alone with the TSR-80. He immediately dismantled it and held his first computer class, showing his friends what made this “computer thing” work. Since that experience, Bo's passion for understanding how computers work and sharing this knowledge with others has resulted in a rewarding career in IT training. His experience includes cloud, Linux, UNIX, IT security, DevOps, and programming languages such as Perl, Python, Tcl, and BASH. He is the founder and lead instructor of One Course Source, an IT training organization.
Introduction. . . . . . . . . . . . . . . . . . . . . . . xxvi
CHAPTER 1: Different Types of Cloud Models.. . . . . . . . . . . . . . . . 1
Cloud Deployment Models.. . . . . . . . . . . . . . . . 2
Cloud Service Models.. . . . . . . . . . . . . . . . . . 6
Advanced Cloud Services.. . . . . . . . . . . . . . . . . 9
Cloud Shared Responsibility Model. . . . . . . . . . . . . 11
What Next?.. . . . . . . . . . . . . . . . . . . . . 14
CHAPTER 2: Capacity Planning.. . . . . . . . . . . . . . . . . . . . . 15
Requirements.. . . . . . . . . . . . . . . . . . . . . 16
Standard Templates.. . . . . . . . . . . . . . . . . . . 18
Licensing.. . . . . . . . . . . . . . . . . . . . . . 18
User Density.. . . . . . . . . . . . . . . . . . . . . 20
System Load. . . . . . . . . . . . . . . . . . . . . 21
Trend Analysis.. . . . . . . . . . . . . . . . . . . . 21
Performance Capacity Planning.. . . . . . . . . . . . . . 22
What Next?.. . . . . . . . . . . . . . . . . . . . . 24
CHAPTER 3: High Availability and Scaling in Cloud Environments.. . . . . . . . 25
Hypervisors.. . . . . . . . . . . . . . . . . . . . . 26
Oversubscription. . . . . . . . . . . . . . . . . . . . 28
Regions and Zones.. . . . . . . . . . . . . . . . . . . 30
Applications.. . . . . . . . . . . . . . . . . . . . . 32
Containers.. . . . . . . . . . . . . . . . . . . . . . 32
Clusters.. . . . . . . . . . . . . . . . . . . . . . . 33
High Availability of Network Functions.. . . . . . . . . . . . 33
Avoid Single Points of Failure. . . . . . . . . . . . . . . 36
Scalability.. . . . . . . . . . . . . . . . . . . . . . 36
What Next?.. . . . . . . . . . . . . . . . . . . . . 39
CHAPTER 4: Solution Design in Support of the Business Requirements.. . . . . . 41
Requirement Analysis.. . . . . . . . . . . . . . . . . . 42
Environments. . . . . . . . . . . . . . . . . . . . . 48
Testing Techniques.. . . . . . . . . . . . . . . . . . . 50
What Next?.. . . . . . . . . . . . . . . . . . . . . 53
CHAPTER 5: Identity and Access Management.. . . . . . . . . . . . . . . 55
Identification and Authorization.. . . . . . . . . . . . . . 56
Directory Services. . . . . . . . . . . . . . . . . . . 60
Federation.. . . . . . . . . . . . . . . . . . . . . . 61
Certificate Management. . . . . . . . . . . . . . . . . 63
Multifactor Authentication (MFA).. . . . . . . . . . . . . . 64
Single Sign-On (SSO).. . . . . . . . . . . . . . . . . . 65
Public Key Infrastructure (PKI).. . . . . . . . . . . . . . 66
Secret Management. . . . . . . . . . . . . . . . . . . 67
Key Management.. . . . . . . . . . . . . . . . . . . 67
What Next?.. . . . . . . . . . . . . . . . . . . . . 69
CHAPTER 6: Secure a Network in a Cloud Environment. . . . . . . . . . . . 71
Network Segmentation.. . . . . . . . . . . . . . . . . 72
Protocols.. . . . . . . . . . . . . . . . . . . . . . 74
Network Services.. . . . . . . . . . . . . . . . . . . 77
Log and Event Monitoring. . . . . . . . . . . . . . . . 80
Network Flows.. . . . . . . . . . . . . . . . . . . . 80
Hardening and Configuration Changes.. . . . . . . . . . . . 81
What Next?.. . . . . . . . . . . . . . . . . . . . . 86
CHAPTER 7: OS and Application Security Controls.. . . . . . . . . . . . . . 87
Policies.. . . . . . . . . . . . . . . . . . . . . . . 88
User Permissions.. . . . . . . . . . . . . . . . . . . 90
Antivirus/Antimalware/Endpoint Detection and Response (EDR).. . . 93
Host-Based IDS (HIDS)/Host-Based IPS (HIPS).. . . . . . . . 94
Hardened Baselines.. . . . . . . . . . . . . . . . . . . 94
File Integrity.. . . . . . . . . . . . . . . . . . . . . 96
Log and Event Monitoring. . . . . . . . . . . . . . . . 96
Configuration Management.. . . . . . . . . . . . . . . . 96
Builds.. . . . . . . . . . . . . . . . . . . . . . . 96
Operating System (OS) Upgrades.. . . . . . . . . . . . . . 98
Encryption. . . . . . . . . . . . . . . . . . . . . . 98
Mandatory Access Control.. . . . . . . . . . . . . . . . 99
Firewall Software.. . . . . . . . . . . . . . . . . . . 100
What Next?.. . . . . . . . . . . . . . . . . . . . . 101
CHAPTER 8: Data Security and Compliance Controls in Cloud Environments.. . . . 103
Encryption. . . . . . . . . . . . . . . . . . . . . . 104
Integrity.. . . . . . . . . . . . . . . . . . . . . . 105
Classification.. . . . . . . . . . . . . . . . . . . . . 107
Segmentation.. . . . . . . . . . . . . . . . . . . . . 108
Access Control.. . . . . . . . . . . . . . . . . . . . 108
Impact of Laws and Regulations.. . . . . . . . . . . . . . 109
Records Management.. . . . . . . . . . . . . . . . . . 110
Data Loss Prevention (DLP).. . . . . . . . . . . . . . . 111
Cloud Access Security Broker (CASB).. . . . . . . . . . . . 111
What Next?.. . . . . . . . . . . . . . . . . . . . . 113
CHAPTER 9: Security Requirements.. . . . . . . . . . . . . . . . . . . 115
Tools.. . . . . . . . . . . . . . . . . . . . . . . . 116
Vulnerability Assessment.. . . . . . . . . . . . . . . . . 117
Security Patches.. . . . . . . . . . . . . . . . . . . . 118
Risk Register.. . . . . . . . . . . . . . . . . . . . . 120
Prioritization of Patch Applications.. . . . . . . . . . . . . 120
Deactivate Default Accounts. . . . . . . . . . . . . . . . 120
Impacts of Security Tools on Systems and Services.. . . . . . . . 121
What Next?.. . . . . . . . . . . . . . . . . . . . . 122
CHAPTER 10: Incident Response Procedures.. . . . . . . . . . . . . . . . 123
Preparation.. . . . . . . . . . . . . . . . . . . . . 124
Incident Response Procedures.. . . . . . . . . . . . . . . 130
What Next?.. . . . . . . . . . . . . . . . . . . . . 134
CHAPTER 11: Integrate Components into a Cloud Solution.. . . . . . . . . . . 135
Subscription Services. . . . . . . . . . . . . . . . . . 136
Provisioning Resources.. . . . . . . . . . . . . . . . . 140
Application. . . . . . . . . . . . . . . . . . . . . . 142
Deploying Virtual Machines (VMs) and Custom Images. . . . . . 143
Templates. . . . . . . . . . . . . . . . . . . . . . 143
Identity Management.. . . . . . . . . . . . . . . . . . 145
Containers.. . . . . . . . . . . . . . . . . . . . . . 145
Auto-scaling.. . . . . . . . . . . . . . . . . . . . . 146
Postdeployment Validation.. . . . . . . . . . . . . . . . 146
What Next?.. . . . . . . . . . . . . . . . . . . . . 148
CHAPTER 12: Storage in Cloud Environments. . . . . . . . . . . . . . . . 149
Types. . . . . . . . . . . . . . . . . . . . . . . . 150
Tiers.. . . . . . . . . . . . . . . . . . . . . . . . 152
Input/Output Operations per Second (IOPS) and Read/Write.. . . . 153
Protocols.. . . . . . . . . . . . . . . . . . . . . . 154
Redundant Array of Inexpensive Disks (RAID).. . . . . . . . . 157
Storage System Features.. . . . . . . . . . . . . . . . . 159
User Quotas. . . . . . . . . . . . . . . . . . . . . 161
Hyperconverged.. . . . . . . . . . . . . . . . . . . . 161
Software-Defined Storage (SDS). . . . . . . . . . . . . . 162
What Next?.. . . . . . . . . . . . . . . . . . . . . 163
CHAPTER 13: Cloud Networking Solutions.. . . . . . . . . . . . . . . . . 165
Services.. . . . . . . . . . . . . . . . . . . . . . . 166
Virtual Private Networks (VPNs).. . . . . . . . . . . . . . 170
Virtual Routing. . . . . . . . . . . . . . . . . . . . 171
Network Appliances.. . . . . . . . . . . . . . . . . . 176
Virtual Private Cloud (VPC). . . . . . . . . . . . . . . . 177
VLAN/VxLAN/GENEVE. . . . . . . . . . . . . . . . 178
Single Root Input/Output Virtualization (SR-IOV).. . . . . . . . 179
Software-Defined Network (SDN).. . . . . . . . . . . . . 179
What Next?.. . . . . . . . . . . . . . . . . . . . . 180
CHAPTER 14: Compute Sizing for a Deployment. . . . . . . . . . . . . . . 181
Virtualization.. . . . . . . . . . . . . . . . . . . . . 182
Central Processing Unit (CPU)/ Virtual CPU (vCPU). . . . . . . 185
Graphics Processing Unit (GPU).. . . . . . . . . . . . . . 186
Clock Speed/Instructions per Cycle (IPC).. . . . . . . . . . . 187
Hyperconverged.. . . . . . . . . . . . . . . . . . . . 188
Memory. . . . . . . . . . . . . . . . . . . . . . . 188
What Next?.. . . . . . . . . . . . . . . . . . . . . 191
CHAPTER 15: Cloud Migrations.. . . . . . . . . . . . . . . . . . . . . 193
Physical to Virtual (P2V).. . . . . . . . . . . . . . . . . 194
Virtual to Virtual (V2V).. . . . . . . . . . . . . . . . . 195
Cloud-to-Cloud Migrations.. . . . . . . . . . . . . . . . 196
Storage Migrations.. . . . . . . . . . . . . . . . . . . 198
Database Migrations.. . . . . . . . . . . . . . . . . . 200
What Next?.. . . . . . . . . . . . . . . . . . . . . 203
CHAPTER 16: Logging, Monitoring, and Alerting.. . . . . . . . . . . . . . . 205
Logging. . . . . . . . . . . . . . . . . . . . . . . 206
Monitoring.. . . . . . . . . . . . . . . . . . . . . 209
Alerting.. . . . . . . . . . . . . . . . . . . . . . . 214
What Next?.. . . . . . . . . . . . . . . . . . . . . 216
CHAPTER 17: Operation of a Cloud Environment.. . . . . . . . . . . . . . . 217
Confirm Completion of Backups. . . . . . . . . . . . . . 218
Lifecycle Management. . . . . . . . . . . . . . . . . . 218
Change Management. . . . . . . . . . . . . . . . . . 220
Asset Management.. . . . . . . . . . . . . . . . . . . 220
Patching.. . . . . . . . . . . . . . . . . . . . . . 221
Impacts of Process Improvements on Systems. . . . . . . . . . 226
Upgrade Methods.. . . . . . . . . . . . . . . . . . . 226
Dashboard and Reporting.. . . . . . . . . . . . . . . . 228
What Next?.. . . . . . . . . . . . . . . . . . . . . 234
CHAPTER 18: Optimize Cloud Environments. . . . . . . . . . . . . . . . . 235
Right-sizing.. . . . . . . . . . . . . . . . . . . . . 236
Compute and Storage.. . . . . . . . . . . . . . . . . . 236
Network.. . . . . . . . . . . . . . . . . . . . . . 237
Placement.. . . . . . . . . . . . . . . . . . . . . . 242
Geographical.. . . . . . . . . . . . . . . . . . . 242
Device Drivers and Firmware.. . . . . . . . . . . . . . . 243
What Next?.. . . . . . . . . . . . . . . . . . . . . 246
CHAPTER 19: Automation and Orchestration Techniques.. . . . . . . . . . . . 247
Infrastructure as Code (IaC).. . . . . . . . . . . . . . . . 248
Continuous Integration/Continuous Deployment (CI/CD).. . . . . 249
Version Control.. . . . . . . . . . . . . . . . . . . . 250
Configuration Management.. . . . . . . . . . . . . . . . 251
Containers.. . . . . . . . . . . . . . . . . . . . . . 252
Automation Activities.. . . . . . . . . . . . . . . . . . 252
Secure Scripting.. . . . . . . . . . . . . . . . . . . . 254
Orchestration Sequencing.. . . . . . . . . . . . . . . . 255
What Next?.. . . . . . . . . . . . . . . . . . . . . 257
CHAPTER 20: Backup and Restore Operations.. . . . . . . . . . . . . . . . 259
Backup Types.. . . . . . . . . . . . . . . . . . . . . 260
Backup Objects. . . . . . . . . . . . . . . . . . . . 263
Backup Targets.. . . . . . . . . . . . . . . . . . . . 265
Backup and Restore Policies.. . . . . . . . . . . . . . . . 266
Restoration Methods.. . . . . . . . . . . . . . . . . . 269
What Next?.. . . . . . . . . . . . . . . . . . . . . 272
CHAPTER 21: Disaster Recovery Tasks.. . . . . . . . . . . . . . . . . . 273
Failovers.. . . . . . . . . . . . . . . . . . . . . . 274
Failback.. . . . . . . . . . . . . . . . . . . . . . . 274
Restore Backups.. . . . . . . . . . . . . . . . . . . . 275
Replication. . . . . . . . . . . . . . . . . . . . . . 275
On-Premises and Cloud Sites.. . . . . . . . . . . . . . . 275
Requirements.. . . . . . . . . . . . . . . . . . . . . 277
Documentation. . . . . . . . . . . . . . . . . . . . 277
Geographical Data Center Requirements.. . . . . . . . . . . 279
What Next?.. . . . . . . . . . . . . . . . . . . . . 280
CHAPTER 22: Troubleshooting Methodology. . . . . . . . . . . . . . . . . 281
Always Consider Corporate Policies, Procedures, and Impacts Before
Implementing Changes.. . . . . . . . . . . . . . . . . 282
1. Identify the Problem.. . . . . . . . . . . . . . . . . 283
2. Establish a Theory of Probable Cause (Question the Obvious).. . . 284
3. Test the Theory to Determine Cause.. . . . . . . . . . . . 285
4. Establish a Plan of Action to Resolve the Problem and Implement the Solution... 285
5. Verify Full System Functionality and, if Applicable, Implement Preventive Measures.. 286
6. Document the Findings, Actions, and Outcomes Throughout the Process.. . 286
What Next?.. . . . . . . . . . . . . . . . . . . . . 288
CHAPTER 23: Troubleshoot Security Issues.. . . . . . . . . . . . . . . . . 289
Privilege.. . . . . . . . . . . . . . . . . . . . . . 290
Authentication.. . . . . . . . . . . . . . . . . . . . 291
Authorization.. . . . . . . . . . . . . . . . . . . . . 292
Security Groups.. . . . . . . . . . . . . . . . . . . . 293
Keys and Certificates. . . . . . . . . . . . . . . . . . 294
Misconfigured or Misapplied Policies.. . . . . . . . . . . . 295
Data Security Issues. . . . . . . . . . . . . . . . . . . 296
Exposed Endpoints.. . . . . . . . . . . . . . . . . . . 297
Misconfigured or Failed Security Appliances. . . . . . . . . . 298
Unsupported Protocols.. . . . . . . . . . . . . . . . . 298
External/Internal Attacks.. . . . . . . . . . . . . . . . . 298
What Next?.. . . . . . . . . . . . . . . . . . . . . 300
CHAPTER 24: Troubleshoot Deployment, Automation, and Orchestration Issues.. . . 301
Connectivity Issues.. . . . . . . . . . . . . . . . . . . 302
Performance Degradation.. . . . . . . . . . . . . . . . 304
Configurations.. . . . . . . . . . . . . . . . . . . . 305
Applications in Containers.. . . . . . . . . . . . . . . . 306
Misconfigured Templates.. . . . . . . . . . . . . . . . . 306
Missing or Incorrect Tags. . . . . . . . . . . . . . . . . 306
Insufficient Capacity.. . . . . . . . . . . . . . . . . . 307
Licensing Issues.. . . . . . . . . . . . . . . . . . . . 307
Vendor-Related Issues.. . . . . . . . . . . . . . . . . . 308
Account Mismatches.. . . . . . . . . . . . . . . . . . 310
Change Management Failures. . . . . . . . . . . . . . . 310
Server Name Changes.. . . . . . . . . . . . . . . . . . 311
IP Address Changes. . . . . . . . . . . . . . . . . . . 311
Location Changes.. . . . . . . . . . . . . . . . . . . 312
Version/Feature Mismatch.. . . . . . . . . . . . . . . . 312
Automation Tool Incompatibility. . . . . . . . . . . . . . 313
Job Validation Issue.. . . . . . . . . . . . . . . . . . . 314
Patching Failure.. . . . . . . . . . . . . . . . . . . . 315
What Next?.. . . . . . . . . . . . . . . . . . . . . 316
CHAPTER 25: Troubleshoot Connectivity Issues and Common Performance Issues.. . 317
Network Security Group Misconfigurations.. . . . . . . . . . 318
Common Networking Configuration Issues.. . . . . . . . . . 319
Network Troubleshooting Tools.. . . . . . . . . . . . . . 324
Resource Utilization.. . . . . . . . . . . . . . . . . . 336
Application. . . . . . . . . . . . . . . . . . . . . . 337
Incorrectly Configured or Failed Load Balancing.. . . . . . . . 338
What Next?.. . . . . . . . . . . . . . . . . . . . . 339
Glossary of Essential Terms and Components.. . . . . . . . . . . 341
9780137393251, TOC, 10/21/2021
Erscheint lt. Verlag | 20.2.2022 |
---|---|
Reihe/Serie | Exam Cram |
Verlagsort | Upper Saddle River |
Sprache | englisch |
Maße | 153 x 230 mm |
Gewicht | 610 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Informatik ► Weitere Themen ► Zertifizierung | |
ISBN-10 | 0-13-739325-3 / 0137393253 |
ISBN-13 | 978-0-13-739325-1 / 9780137393251 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich