0%

Complete coverage of every objective for the CompTIA Cloud+ exam

Take the CompTIA Cloud+ exam with confidence using this highly effective self-study guide. CompTIA Cloud+™ Certification All-in-One Exam Guide (Exam CV0-003) offers complete coverage of every topic on the latest version of the exam. You’ll find learning objectives at the beginning of each chapter, exam tips, in-depth explanations, and practice exam questions. You will get in-depth explanations of the latest cloud computing concepts, models, and terminology; disk storage systems; networking storage and infrastructure; virtualization components; security best practices, and more. Designed to help you pass the CV0-003 exam with ease, this definitive guide also serves as an essential on-the-job reference.

Coverage includes:

  • DevOps
  • Performance tuning
  • Systems management
  • Architecture and design
  • Services and solutions
  • Business continuity and disaster recovery
  • Testing, automation, and changes
  • Environment maintenance, security, and optimization
  • Troubleshooting
Online content includes:
  • 200 practice exam questions
  • Interactive performance-based questions
  • Test engine that provides full-length practice exams and customizable quizzes by chapter or exam objective







Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Dedication
  5. Contents
  6. Acknowledgments
  7. Introduction
  8. Chapter 1 Cloud Computing Concepts, Models, and Terminology
    1. Cloud Service Models
    2. Infrastructure as a Service
    3. Platform as a Service
    4. Software as a Service
    5. Database as a Service
    6. Communications as a Service
    7. Business Process as a Service
    8. Anything as a Service
    9. Accountability and the Shared Responsibility Model
    10. Cloud Deployment Models and Services
    11. Private Cloud
    12. Public Cloud
    13. Hybrid Cloud
    14. Community Cloud
    15. Cloud Within a Cloud
    16. On-Premises vs. Off-Premises Hosting
    17. Orchestration Platforms
    18. Multicloud
    19. Cloud Characteristics and Terms
    20. Elasticity
    21. Demand-Driven Service
    22. Pay-as-You-Grow
    23. Chargeback
    24. Ubiquitous Access
    25. Metering
    26. Multitenancy
    27. Cloud Bursting
    28. Baselines
    29. Source and Target Hosts
    30. Existing Systems
    31. Cloud Elements
    32. Advanced Cloud Services
    33. Machine Learning and Artificial Intelligence
    34. Serverless
    35. Exercise 1-1: Creating a Basic Serverless Application on AWS Lambda
    36. Internet of Things
    37. Chapter Review
    38. Questions
    39. Answers
  9. Chapter 2 Disk Storage Systems
    1. Disk Types and Configurations
    2. Rotational Media
    3. Solid State Drive
    4. USB Drive
    5. Tape
    6. Interface Types
    7. Access Speed
    8. Redundant Array of Independent Disks (RAID)
    9. Write Once, Read Many (WORM)
    10. Tiering
    11. Performance Levels of Each Tier
    12. Policies
    13. File System Types
    14. Unix File System
    15. Extended File System
    16. File Allocation Table File System
    17. New Technology File System
    18. Exercise 2-1: Formatting a Disk with the NTFS Partition in Windows
    19. Resilient File System
    20. Virtual Machine File System
    21. Z File System
    22. Chapter Review
    23. Questions
    24. Answers
  10. Chapter 3 Storage Networking
    1. Storage Types and Technologies
    2. Direct Attached Storage
    3. Storage Area Network
    4. Network Attached Storage
    5. Object Storage
    6. Exercise 3-1: Creating Object Storage
    7. Deduplication Technologies
    8. Compression Technologies
    9. Data BLOB
    10. Storage Access Protocols
    11. Fibre Channel
    12. Fibre Channel Protocol
    13. Fibre Channel over Ethernet
    14. Ethernet
    15. TCP/IP
    16. Internet Fibre Channel Protocol
    17. Internet Small Computer System Interface
    18. Nonvolatile Memory Express Over Fabrics
    19. Storage Provisioning
    20. Performance
    21. Logical Unit Numbers
    22. Network Shares
    23. Zoning and LUN Masking
    24. Multipathing
    25. Provisioning Model
    26. Encryption Requirements
    27. Tokenization
    28. Storage Protection
    29. High Availability
    30. Storage Replication
    31. Chapter Review
    32. Questions
    33. Answers
  11. Chapter 4 Network Infrastructure
    1. Network Types
    2. Intranet
    3. Internet
    4. Extranet
    5. Network Optimization
    6. Network Scope
    7. Network Topologies
    8. Bandwidth and Latency
    9. Load Balancing
    10. Network Service Tiers
    11. Exercise 4-1: Configuring Network Service Tiers in Google Cloud
    12. Proxy Servers
    13. Content Delivery Network
    14. Routing and Switching
    15. Network Address Translation
    16. Port Address Translation
    17. Subnetting and Supernetting
    18. Routing Tables
    19. Network Segmentation and Micro-segmentation
    20. Network Ports and Protocols
    21. Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure
    22. File Transfer Protocol and FTP over SSL
    23. Secure Shell File Transfer Protocol
    24. Domain Name System
    25. Dynamic Host Configuration Protocol
    26. IP Address Management
    27. Simple Mail Transfer Protocol
    28. Network Time Protocol
    29. Well-Known Ports
    30. Chapter Review
    31. Questions
    32. Answers
  12. Chapter 5 Virtualization Components
    1. Hypervisor
    2. Type 1
    3. Type 2
    4. Proprietary
    5. Open Source
    6. Consumer vs. Enterprise
    7. Virtualization Host
    8. Hardware-Assisted Virtualization
    9. Single Root Input/Output Virtualization
    10. BIOS
    11. UEFI
    12. Firmware Configurations
    13. Hyperconverged Systems and Infrastructure
    14. VM Sizing Considerations
    15. CPU
    16. GPU
    17. Memory
    18. NIC
    19. Exercise 5-1: Creating a Virtual Switch in Hyper-V
    20. Virtual Machine
    21. Virtual Disks
    22. vNIC
    23. Virtual Switches
    24. Memory
    25. Storage Virtualization
    26. Guest Tools
    27. Exercise 5-2: Creating a Virtual Machine in Hyper-V
    28. Virtualized Infrastructure Service Elements
    29. DNS
    30. DHCP
    31. Certificate Services
    32. Local Agents
    33. Antivirus
    34. Load Balancing
    35. Multifactor Authentication
    36. Firewall
    37. IDS/IPS
    38. Chapter Review
    39. Questions
    40. Answers
  13. Chapter 6 Virtualization and the Cloud
    1. Benefits of Virtualization in a Cloud Environment
    2. Shared Resources
    3. Elasticity
    4. Network and Application Isolation
    5. Infrastructure Consolidation
    6. Virtual Data Center Creation
    7. Virtual Resource Migrations
    8. Virtual Machine Templates
    9. Physical to Virtual
    10. Virtual to Virtual
    11. Virtual to Physical
    12. Physical to Physical
    13. Virtual Machine Cloning
    14. Virtual Machine Snapshots
    15. Clones vs. Snapshots
    16. Storage Migration
    17. Host Clustering and HA/DR
    18. Cloud Provider Migrations
    19. Exercise 6-1: Creating a Cloud Firewall on Azure
    20. Migration Considerations
    21. Requirements Gathering
    22. Migration Scheduling
    23. Upgrading
    24. Testing
    25. Databases
    26. Software Defined
    27. Software Defined Network
    28. Software Defined Storage
    29. Software Defined Data Center
    30. Chapter Review
    31. Questions
    32. Answers
  14. Chapter 7 Cloud Adoption
    1. Planning
    2. Requirement Analysis
    3. Designing a Solution
    4. Selection
    5. Deployment Plan
    6. Approval
    7. Implementation
    8. Service Model Solutions
    9. Solutions
    10. Deploying Virtual Systems
    11. Networking
    12. Exercise 7-1: Creating a Virtual Network in Azure
    13. Exercise 7-2: Creating a Default Route on Azure
    14. Containers
    15. Post-Deployment Validation
    16. Remote Access Tools
    17. Remote Hypervisor Access
    18. RDP
    19. Console Port
    20. SSH
    21. HTTP
    22. Chapter Review
    23. Questions
    24. Answers
  15. Chapter 8 DevOps
    1. Application Life Cycle
    2. Phase 1: Specifications
    3. Phase 2: Development
    4. Phase 3: Testing
    5. Phase 4: Deployment
    6. Phase 5: Maintenance
    7. Life Cycle Management
    8. Ending Applications
    9. Application Replacement
    10. Application Retirement
    11. Application Migration
    12. Application Feature Use (Increase/Decrease)
    13. Secure Coding
    14. Avoid Hardcoded Passwords
    15. Service Account Best Practices
    16. Password Vaults
    17. Key-Based Authentication
    18. Exercise 8-1: Setting Up SSH Keys for Key-Based Authentication
    19. DevOps Cloud Transformation
    20. Business Needs Change
    21. Continuous Integration/Continuous Delivery
    22. Infrastructure as Code
    23. Chapter Review
    24. Questions
    25. Answers
  16. Chapter 9 Performance Tuning
    1. Host Resource Allocation
    2. Compute Resources
    3. Quotas and Limits
    4. Licensing
    5. Reservations
    6. Resource Pools
    7. Guest Resource Allocation
    8. Compute Resources
    9. Quotas and Limits
    10. Licensing
    11. Physical Resource Redirection
    12. Resource Pools
    13. Dynamic Resource Allocation
    14. Optimizing Performance
    15. Configuration Best Practices
    16. Exercise 9-1: Setting CPU Affinity and Anti-Affinity Rules in VMWare Cloud
    17. Scalability
    18. Performance Concepts
    19. Performance Automation
    20. Common Performance Issues
    21. Common Disk Issues
    22. Common Memory Issues
    23. Network Issues
    24. Physical Processor Issues
    25. Chapter Review
    26. Questions
    27. Answers
  17. Chapter 10 Systems Management
    1. Policies and Procedures
    2. Standard Operating Procedures
    3. Workflow
    4. Capacity Management
    5. Records Management
    6. Systems Management Best Practices
    7. Documentation
    8. Standardization
    9. Metrics
    10. Dashboards
    11. Planning
    12. Systems Maintenance
    13. Code Updates
    14. Deployment Landscapes
    15. Deployment Methodologies
    16. Patch Management
    17. Exercise 10-1: Configuring Group Policy for Automatic Updates
    18. Component Updates
    19. Maintenance Automation
    20. Monitoring Techniques
    21. Collector Protocols and Methods
    22. Tagging
    23. Log Analysis
    24. Baselines
    25. Thresholds
    26. Trending
    27. Automated Event Responses
    28. Log Scrubbing
    29. Verification of Continuous Monitoring Activities
    30. Management Tools
    31. Chapter Review
    32. Questions
    33. Answers
  18. Chapter 11 Security in the Cloud
    1. Data Security
    2. Encryption
    3. Public Key Infrastructure
    4. Encryption Protocols
    5. Tunneling Protocols
    6. Ciphers
    7. Storage Security
    8. Protected Backups
    9. Network Security
    10. Segmentation
    11. Firewall
    12. DDoS Protection
    13. Packet Capture
    14. Network Flow
    15. IDS/IPS
    16. Packet Broker
    17. APIs
    18. Effects of Cloud Service Models on Security Implementation
    19. Endpoint Protection
    20. Host-Based Firewall
    21. Antivirus/Antimalware
    22. Endpoint Detection and Response
    23. Data Loss Prevention
    24. Exercise 11-1: Creating a DLP Policy for Office 365
    25. NAC
    26. Hardening
    27. Application Whitelisting
    28. Impact of Security Tools to Systems and Services
    29. Access Control
    30. Identification
    31. Authentication
    32. Authorization
    33. Single Sign-On
    34. Federation
    35. Access Control Protocols
    36. Access Control Methodologies
    37. Multifactor Authentication
    38. Chapter Review
    39. Questions
    40. Answers
  19. Chapter 12 Security Best Practices
    1. Cloud Security Engineering
    2. Implementing Layered Security
    3. Protecting Against Availability Attacks
    4. Least Privilege
    5. Separation of Duties
    6. Security Automation
    7. Security Governance and Strategy
    8. Developing Company Security Policies
    9. Account Management Policies
    10. Documenting Security Procedures
    11. Assessment and Auditing
    12. Leveraging Established Industry Standards and Regulations
    13. Applying Platform-Specific Security Standards
    14. Data Classification
    15. Legal Holds
    16. Exercise 12-1: Creating a Legal Hold for a Mailbox in Office 365
    17. Keeping Employees and Tools Up to Date
    18. Roles and Responsibilities
    19. Vulnerability Management
    20. Testing Methods
    21. Vulnerability Scanning
    22. Penetration Testing
    23. Roles and Responsibilities
    24. Considerations Before You Scan or Test
    25. Incident Response
    26. Preparation
    27. Incident Types
    28. Incident Response Procedures
    29. Chapter Review
    30. Questions
    31. Answers
  20. Chapter 13 Business Continuity and Disaster Recovery
    1. Business Continuity Methods
    2. Business Continuity Plan
    3. Contingency
    4. Resiliency
    5. High Availability
    6. Service-Level Agreements for BCP and HA
    7. Disaster Recovery Methods
    8. Corporate Guidelines/Documentation
    9. Replication
    10. File Transfer
    11. Service-Level Agreements for DR
    12. Backup and Recovery
    13. Backup Types
    14. Backup Target
    15. Exercise 13-1: Cross-Region Replication
    16. Other Backup Considerations
    17. Restoration Methods
    18. Archiving
    19. Chapter Review
    20. Questions
    21. Answers
  21. Chapter 14 Testing, Automation, and Changes
    1. Testing Techniques
    2. Baseline Comparisons
    3. Exercise 14-1: Collecting Windows Metrics with Performance Monitor
    4. Performance Testing
    5. Configuration Testing
    6. Testing in the Cloud Landscape
    7. Functional Testing
    8. Regression Testing
    9. Usability Testing
    10. SLA Comparisons
    11. Testing Sizing Changes
    12. Testing High Availability
    13. Testing Load Balancing
    14. Testing Connectivity
    15. Verifying Data Integrity
    16. Evaluating Replication
    17. Automation and Orchestration
    18. Event Orchestration
    19. Scripting
    20. Custom Programming
    21. Runbook Management for Single Nodes
    22. Orchestration for Multiple Nodes and Runbooks
    23. Automation Activities
    24. Change and Configuration Management
    25. Change Management
    26. Configuration Management
    27. Chapter Review
    28. Questions
    29. Answers
  22. Chapter 15 Troubleshooting
    1. Troubleshooting Methodology
    2. Troubleshooting Steps
    3. Security Issues
    4. Exercise 15-1: Using the Google Cloud Policy Troubleshooter
    5. Deployment Issues
    6. Connectivity Issues
    7. Performance Issues
    8. Capacity Issues
    9. Automation and Orchestration Issues
    10. Documentation and Analysis
    11. Documentation
    12. Log Files
    13. Troubleshooting Tools
    14. Connectivity Tools
    15. Configuration Tools
    16. Query Tools
    17. Remote Administration Tools
    18. Chapter Review
    19. Questions
    20. Answers
  23. Appendix A Objective Map
    1. Exam CV0-003
  24. Appendix B About the Online Content
    1. System Requirements
    2. Your Total Seminars Training Hub Account
    3. Privacy Notice
    4. Single User License Terms and Conditions
    5. TotalTester Online
    6. Performance-Based Questions
    7. Technical Support
  25. Index
3.90.187.11