CompTIA Cloud+ CV0-003 Exam Cram

CompTIA Cloud+ CV0-003 Exam Cram

by William Rothwell
CompTIA Cloud+ CV0-003 Exam Cram

CompTIA Cloud+ CV0-003 Exam Cram

by William Rothwell

$44.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Related collections and offers


Overview

CompTIA® Cloud+ CV0-003 Exam Cram is an all-inclusive study guide designed to help you pass the updated version of the CompTIA Cloud+ exam. Prepare for test day success with complete coverage of exam objectives and topics, plus hundreds of realistic practice questions. Extensive prep tools include quizzes and our essential last-minute review CramSheet. The powerful Pearson Test Prep practice software provides real-time assessment and feedback with two complete exams.




Covers the critical information needed to score higher on your Cloud+ CV0-003 exam!




  • Understand Cloud architecture and design
  • Secure a network in a Cloud environment
  • Apply data security and compliance controls and implement measures to meet security requirements
  • Deploy Cloud networking solutions
  • Perform Cloud migrations
  • Optimize and maintain efficient operation of a Cloud environment
  • Understand disaster recovery tasks
  • Troubleshoot security, deployment, connectivity, and other performance issues





Prepare for your exam with Pearson Test Prep




  • Realistic practice questions and answers
  • Comprehensive reporting and feedback
  • Customized testing in study, practice exam, or flash card modes
  • Complete coverage of Cloud+ CV0-003 exam objectives



Product Details

ISBN-13: 9780137393251
Publisher: Pearson Education
Publication date: 12/20/2021
Series: Exam Cram
Pages: 432
Product dimensions: 6.10(w) x 8.95(h) x 1.45(d)

About the Author

At the impressionable age of 14, William “Bo” Rothwell crossed paths with a TRS-80 Micro Computer System (affectionately known as a “Trash 80”). Soon after, the adults responsible for Bo made the mistake of leaving him alone with the TSR-80. He immediately dismantled it and held his first computer class, showing his friends what made this “computer thing” work. Since that experience, Bo's passion for understanding how computers work and sharing this knowledge with others has resulted in a rewarding career in IT training. His experience includes cloud, Linux, UNIX, IT security, DevOps, and programming languages such as Perl, Python, Tcl, and BASH. He is the founder and lead instructor of One Course Source, an IT training organization.

Table of Contents

Introduction. . . . . . . . . . . . . . . . . . . . . . . xxvi


CHAPTER 1: Different Types of Cloud Models.. . . . . . . . . . . . . . . . 1


Cloud Deployment Models.. . . . . . . . . . . . . . . . 2


Cloud Service Models.. . . . . . . . . . . . . . . . . . 6


Advanced Cloud Services.. . . . . . . . . . . . . . . . . 9


Cloud Shared Responsibility Model. . . . . . . . . . . . . 11


What Next?.. . . . . . . . . . . . . . . . . . . . . 14


CHAPTER 2: Capacity Planning.. . . . . . . . . . . . . . . . . . . . . 15


Requirements.. . . . . . . . . . . . . . . . . . . . . 16


Standard Templates.. . . . . . . . . . . . . . . . . . . 18


Licensing.. . . . . . . . . . . . . . . . . . . . . . 18


User Density.. . . . . . . . . . . . . . . . . . . . . 20


System Load. . . . . . . . . . . . . . . . . . . . . 21


Trend Analysis.. . . . . . . . . . . . . . . . . . . . 21


Performance Capacity Planning.. . . . . . . . . . . . . . 22


What Next?.. . . . . . . . . . . . . . . . . . . . . 24


CHAPTER 3: High Availability and Scaling in Cloud Environments.. . . . . . . . 25


Hypervisors.. . . . . . . . . . . . . . . . . . . . . 26


Oversubscription. . . . . . . . . . . . . . . . . . . . 28


Regions and Zones.. . . . . . . . . . . . . . . . . . . 30


Applications.. . . . . . . . . . . . . . . . . . . . . 32


Containers.. . . . . . . . . . . . . . . . . . . . . . 32


Clusters.. . . . . . . . . . . . . . . . . . . . . . . 33


High Availability of Network Functions.. . . . . . . . . . . . 33


Avoid Single Points of Failure. . . . . . . . . . . . . . . 36


Scalability.. . . . . . . . . . . . . . . . . . . . . . 36


What Next?.. . . . . . . . . . . . . . . . . . . . . 39


CHAPTER 4: Solution Design in Support of the Business Requirements.. . . . . . 41


Requirement Analysis.. . . . . . . . . . . . . . . . . . 42


Environments. . . . . . . . . . . . . . . . . . . . . 48


Testing Techniques.. . . . . . . . . . . . . . . . . . . 50


What Next?.. . . . . . . . . . . . . . . . . . . . . 53


CHAPTER 5: Identity and Access Management.. . . . . . . . . . . . . . . 55


Identification and Authorization.. . . . . . . . . . . . . . 56


Directory Services. . . . . . . . . . . . . . . . . . . 60


Federation.. . . . . . . . . . . . . . . . . . . . . . 61


Certificate Management. . . . . . . . . . . . . . . . . 63


Multifactor Authentication (MFA).. . . . . . . . . . . . . . 64


Single Sign-On (SSO).. . . . . . . . . . . . . . . . . . 65


Public Key Infrastructure (PKI).. . . . . . . . . . . . . . 66


Secret Management. . . . . . . . . . . . . . . . . . . 67


Key Management.. . . . . . . . . . . . . . . . . . . 67


What Next?.. . . . . . . . . . . . . . . . . . . . . 69


CHAPTER 6: Secure a Network in a Cloud Environment. . . . . . . . . . . . 71


Network Segmentation.. . . . . . . . . . . . . . . . . 72


Protocols.. . . . . . . . . . . . . . . . . . . . . . 74


Network Services.. . . . . . . . . . . . . . . . . . . 77


Log and Event Monitoring. . . . . . . . . . . . . . . . 80


Network Flows.. . . . . . . . . . . . . . . . . . . . 80


Hardening and Configuration Changes.. . . . . . . . . . . . 81


What Next?.. . . . . . . . . . . . . . . . . . . . . 86


CHAPTER 7: OS and Application Security Controls.. . . . . . . . . . . . . . 87


Policies.. . . . . . . . . . . . . . . . . . . . . . . 88


User Permissions.. . . . . . . . . . . . . . . . . . . 90


Antivirus/Antimalware/Endpoint Detection and Response (EDR).. . . 93


Host-Based IDS (HIDS)/Host-Based IPS (HIPS).. . . . . . . . 94


Hardened Baselines.. . . . . . . . . . . . . . . . . . . 94


File Integrity.. . . . . . . . . . . . . . . . . . . . . 96


Log and Event Monitoring. . . . . . . . . . . . . . . . 96


Configuration Management.. . . . . . . . . . . . . . . . 96


Builds.. . . . . . . . . . . . . . . . . . . . . . . 96


Operating System (OS) Upgrades.. . . . . . . . . . . . . . 98


Encryption. . . . . . . . . . . . . . . . . . . . . . 98


Mandatory Access Control.. . . . . . . . . . . . . . . . 99


Firewall Software.. . . . . . . . . . . . . . . . . . . 100


What Next?.. . . . . . . . . . . . . . . . . . . . . 101


CHAPTER 8: Data Security and Compliance Controls in Cloud Environments.. . . . 103


Encryption. . . . . . . . . . . . . . . . . . . . . . 104


Integrity.. . . . . . . . . . . . . . . . . . . . . . 105


Classification.. . . . . . . . . . . . . . . . . . . . . 107


Segmentation.. . . . . . . . . . . . . . . . . . . . . 108


Access Control.. . . . . . . . . . . . . . . . . . . . 108


Impact of Laws and Regulations.. . . . . . . . . . . . . . 109


Records Management.. . . . . . . . . . . . . . . . . . 110


Data Loss Prevention (DLP).. . . . . . . . . . . . . . . 111


Cloud Access Security Broker (CASB).. . . . . . . . . . . . 111


What Next?.. . . . . . . . . . . . . . . . . . . . . 113


CHAPTER 9: Security Requirements.. . . . . . . . . . . . . . . . . . . 115


Tools.. . . . . . . . . . . . . . . . . . . . . . . . 116


Vulnerability Assessment.. . . . . . . . . . . . . . . . . 117


Security Patches.. . . . . . . . . . . . . . . . . . . . 118


Risk Register.. . . . . . . . . . . . . . . . . . . . . 120


Prioritization of Patch Applications.. . . . . . . . . . . . . 120


Deactivate Default Accounts. . . . . . . . . . . . . . . . 120


Impacts of Security Tools on Systems and Services.. . . . . . . . 121


What Next?.. . . . . . . . . . . . . . . . . . . . . 122


CHAPTER 10: Incident Response Procedures.. . . . . . . . . . . . . . . . 123


Preparation.. . . . . . . . . . . . . . . . . . . . . 124


Incident Response Procedures.. . . . . . . . . . . . . . . 130


What Next?.. . . . . . . . . . . . . . . . . . . . . 134


CHAPTER 11: Integrate Components into a Cloud Solution.. . . . . . . . . . . 135


Subscription Services. . . . . . . . . . . . . . . . . . 136


Provisioning Resources.. . . . . . . . . . . . . . . . . 140


Application. . . . . . . . . . . . . . . . . . . . . . 142


Deploying Virtual Machines (VMs) and Custom Images. . . . . . 143


Templates. . . . . . . . . . . . . . . . . . . . . . 143


Identity Management.. . . . . . . . . . . . . . . . . . 145


Containers.. . . . . . . . . . . . . . . . . . . . . . 145


Auto-scaling.. . . . . . . . . . . . . . . . . . . . . 146


Postdeployment Validation.. . . . . . . . . . . . . . . . 146


What Next?.. . . . . . . . . . . . . . . . . . . . . 148


CHAPTER 12: Storage in Cloud Environments. . . . . . . . . . . . . . . . 149


Types. . . . . . . . . . . . . . . . . . . . . . . . 150


Tiers.. . . . . . . . . . . . . . . . . . . . . . . . 152


Input/Output Operations per Second (IOPS) and Read/Write.. . . . 153


Protocols.. . . . . . . . . . . . . . . . . . . . . . 154


Redundant Array of Inexpensive Disks (RAID).. . . . . . . . . 157


Storage System Features.. . . . . . . . . . . . . . . . . 159


User Quotas. . . . . . . . . . . . . . . . . . . . . 161


Hyperconverged.. . . . . . . . . . . . . . . . . . . . 161


Software-Defined Storage (SDS). . . . . . . . . . . . . . 162


What Next?.. . . . . . . . . . . . . . . . . . . . . 163


CHAPTER 13: Cloud Networking Solutions.. . . . . . . . . . . . . . . . . 165


Services.. . . . . . . . . . . . . . . . . . . . . . . 166


Virtual Private Networks (VPNs).. . . . . . . . . . . . . . 170


Virtual Routing. . . . . . . . . . . . . . . . . . . . 171


Network Appliances.. . . . . . . . . . . . . . . . . . 176


Virtual Private Cloud (VPC). . . . . . . . . . . . . . . . 177


VLAN/VxLAN/GENEVE. . . . . . . . . . . . . . . . 178


Single Root Input/Output Virtualization (SR-IOV).. . . . . . . . 179


Software-Defined Network (SDN).. . . . . . . . . . . . . 179


What Next?.. . . . . . . . . . . . . . . . . . . . . 180


CHAPTER 14: Compute Sizing for a Deployment. . . . . . . . . . . . . . . 181


Virtualization.. . . . . . . . . . . . . . . . . . . . . 182


Central Processing Unit (CPU)/ Virtual CPU (vCPU). . . . . . . 185


Graphics Processing Unit (GPU).. . . . . . . . . . . . . . 186


Clock Speed/Instructions per Cycle (IPC).. . . . . . . . . . . 187


Hyperconverged.. . . . . . . . . . . . . . . . . . . . 188


Memory. . . . . . . . . . . . . . . . . . . . . . . 188


What Next?.. . . . . . . . . . . . . . . . . . . . . 191


CHAPTER 15: Cloud Migrations.. . . . . . . . . . . . . . . . . . . . . 193


Physical to Virtual (P2V).. . . . . . . . . . . . . . . . . 194


Virtual to Virtual (V2V).. . . . . . . . . . . . . . . . . 195


Cloud-to-Cloud Migrations.. . . . . . . . . . . . . . . . 196


Storage Migrations.. . . . . . . . . . . . . . . . . . . 198


Database Migrations.. . . . . . . . . . . . . . . . . . 200


What Next?.. . . . . . . . . . . . . . . . . . . . . 203


CHAPTER 16: Logging, Monitoring, and Alerting.. . . . . . . . . . . . . . . 205


Logging. . . . . . . . . . . . . . . . . . . . . . . 206


Monitoring.. . . . . . . . . . . . . . . . . . . . . 209


Alerting.. . . . . . . . . . . . . . . . . . . . . . . 214


What Next?.. . . . . . . . . . . . . . . . . . . . . 216


CHAPTER 17: Operation of a Cloud Environment.. . . . . . . . . . . . . . . 217


Confirm Completion of Backups. . . . . . . . . . . . . . 218


Lifecycle Management. . . . . . . . . . . . . . . . . . 218


Change Management. . . . . . . . . . . . . . . . . . 220


Asset Management.. . . . . . . . . . . . . . . . . . . 220


Patching.. . . . . . . . . . . . . . . . . . . . . . 221


Impacts of Process Improvements on Systems. . . . . . . . . . 226


Upgrade Methods.. . . . . . . . . . . . . . . . . . . 226


Dashboard and Reporting.. . . . . . . . . . . . . . . . 228


What Next?.. . . . . . . . . . . . . . . . . . . . . 234


CHAPTER 18: Optimize Cloud Environments. . . . . . . . . . . . . . . . . 235


Right-sizing.. . . . . . . . . . . . . . . . . . . . . 236


Compute and Storage.. . . . . . . . . . . . . . . . . . 236


Network.. . . . . . . . . . . . . . . . . . . . . . 237


Placement.. . . . . . . . . . . . . . . . . . . . . . 242


Geographical.. . . . . . . . . . . . . . . . . . . 242


Device Drivers and Firmware.. . . . . . . . . . . . . . . 243


What Next?.. . . . . . . . . . . . . . . . . . . . . 246


CHAPTER 19: Automation and Orchestration Techniques.. . . . . . . . . . . . 247


Infrastructure as Code (IaC).. . . . . . . . . . . . . . . . 248


Continuous Integration/Continuous Deployment (CI/CD).. . . . . 249


Version Control.. . . . . . . . . . . . . . . . . . . . 250


Configuration Management.. . . . . . . . . . . . . . . . 251


Containers.. . . . . . . . . . . . . . . . . . . . . . 252


Automation Activities.. . . . . . . . . . . . . . . . . . 252


Secure Scripting.. . . . . . . . . . . . . . . . . . . . 254


Orchestration Sequencing.. . . . . . . . . . . . . . . . 255


What Next?.. . . . . . . . . . . . . . . . . . . . . 257


CHAPTER 20: Backup and Restore Operations.. . . . . . . . . . . . . . . . 259


Backup Types.. . . . . . . . . . . . . . . . . . . . . 260


Backup Objects. . . . . . . . . . . . . . . . . . . . 263


Backup Targets.. . . . . . . . . . . . . . . . . . . . 265


Backup and Restore Policies.. . . . . . . . . . . . . . . . 266


Restoration Methods.. . . . . . . . . . . . . . . . . . 269


What Next?.. . . . . . . . . . . . . . . . . . . . . 272


CHAPTER 21: Disaster Recovery Tasks.. . . . . . . . . . . . . . . . . . 273


Failovers.. . . . . . . . . . . . . . . . . . . . . . 274


Failback.. . . . . . . . . . . . . . . . . . . . . . . 274


Restore Backups.. . . . . . . . . . . . . . . . . . . . 275


Replication. . . . . . . . . . . . . . . . . . . . . . 275


On-Premises and Cloud Sites.. . . . . . . . . . . . . . . 275


Requirements.. . . . . . . . . . . . . . . . . . . . . 277


Documentation. . . . . . . . . . . . . . . . . . . . 277


Geographical Data Center Requirements.. . . . . . . . . . . 279


What Next?.. . . . . . . . . . . . . . . . . . . . . 280


CHAPTER 22: Troubleshooting Methodology. . . . . . . . . . . . . . . . . 281


Always Consider Corporate Policies, Procedures, and Impacts Before


Implementing Changes.. . . . . . . . . . . . . . . . . 282


1. Identify the Problem.. . . . . . . . . . . . . . . . . 283


2. Establish a Theory of Probable Cause (Question the Obvious).. . . 284


3. Test the Theory to Determine Cause.. . . . . . . . . . . . 285


4. Establish a Plan of Action to Resolve the Problem and Implement the Solution... 285


5. Verify Full System Functionality and, if Applicable, Implement Preventive Measures.. 286


6. Document the Findings, Actions, and Outcomes Throughout the Process.. . 286


What Next?.. . . . . . . . . . . . . . . . . . . . . 288


CHAPTER 23: Troubleshoot Security Issues.. . . . . . . . . . . . . . . . . 289


Privilege.. . . . . . . . . . . . . . . . . . . . . . 290


Authentication.. . . . . . . . . . . . . . . . . . . . 291


Authorization.. . . . . . . . . . . . . . . . . . . . . 292


Security Groups.. . . . . . . . . . . . . . . . . . . . 293


Keys and Certificates. . . . . . . . . . . . . . . . . . 294


Misconfigured or Misapplied Policies.. . . . . . . . . . . . 295


Data Security Issues. . . . . . . . . . . . . . . . . . . 296


Exposed Endpoints.. . . . . . . . . . . . . . . . . . . 297


Misconfigured or Failed Security Appliances. . . . . . . . . . 298


Unsupported Protocols.. . . . . . . . . . . . . . . . . 298


External/Internal Attacks.. . . . . . . . . . . . . . . . . 298


What Next?.. . . . . . . . . . . . . . . . . . . . . 300


CHAPTER 24: Troubleshoot Deployment, Automation, and Orchestration Issues.. . . 301


Connectivity Issues.. . . . . . . . . . . . . . . . . . . 302


Performance Degradation.. . . . . . . . . . . . . . . . 304


Configurations.. . . . . . . . . . . . . . . . . . . . 305


Applications in Containers.. . . . . . . . . . . . . . . . 306


Misconfigured Templates.. . . . . . . . . . . . . . . . . 306


Missing or Incorrect Tags. . . . . . . . . . . . . . . . . 306


Insufficient Capacity.. . . . . . . . . . . . . . . . . . 307


Licensing Issues.. . . . . . . . . . . . . . . . . . . . 307


Vendor-Related Issues.. . . . . . . . . . . . . . . . . . 308


Account Mismatches.. . . . . . . . . . . . . . . . . . 310


Change Management Failures. . . . . . . . . . . . . . . 310


Server Name Changes.. . . . . . . . . . . . . . . . . . 311


IP Address Changes. . . . . . . . . . . . . . . . . . . 311


Location Changes.. . . . . . . . . . . . . . . . . . . 312


Version/Feature Mismatch.. . . . . . . . . . . . . . . . 312


Automation Tool Incompatibility. . . . . . . . . . . . . . 313


Job Validation Issue.. . . . . . . . . . . . . . . . . . . 314


Patching Failure.. . . . . . . . . . . . . . . . . . . . 315


What Next?.. . . . . . . . . . . . . . . . . . . . . 316


CHAPTER 25: Troubleshoot Connectivity Issues and Common Performance Issues.. . 317


Network Security Group Misconfigurations.. . . . . . . . . . 318


Common Networking Configuration Issues.. . . . . . . . . . 319


Network Troubleshooting Tools.. . . . . . . . . . . . . . 324


Resource Utilization.. . . . . . . . . . . . . . . . . . 336


Application. . . . . . . . . . . . . . . . . . . . . . 337


Incorrectly Configured or Failed Load Balancing.. . . . . . . . 338


What Next?.. . . . . . . . . . . . . . . . . . . . . 339


Glossary of Essential Terms and Components.. . . . . . . . . . . 341






9780137393251, TOC, 10/21/2021



From the B&N Reads Blog

Customer Reviews