CompTIA Cloud+ Certification All-in-One Exam Guide (Exam CV0-003)

Book description

Complete coverage of every objective for the CompTIA Cloud+ exam

Take the CompTIA Cloud+ exam with confidence using this highly effective self-study guide. CompTIA Cloud+™ Certification All-in-One Exam Guide (Exam CV0-003) offers complete coverage of every topic on the latest version of the exam. You’ll find learning objectives at the beginning of each chapter, exam tips, in-depth explanations, and practice exam questions. You will get in-depth explanations of the latest cloud computing concepts, models, and terminology; disk storage systems; networking storage and infrastructure; virtualization components; security best practices, and more. Designed to help you pass the CV0-003 exam with ease, this definitive guide also serves as an essential on-the-job reference.

Coverage includes:

  • DevOps
  • Performance tuning
  • Systems management
  • Architecture and design
  • Services and solutions
  • Business continuity and disaster recovery
  • Testing, automation, and changes
  • Environment maintenance, security, and optimization
  • Troubleshooting
Online content includes:
  • 200 practice exam questions
  • Interactive performance-based questions
  • Test engine that provides full-length practice exams and customizable quizzes by chapter or exam objective







Table of contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Dedication
  5. Contents
  6. Acknowledgments
  7. Introduction
  8. Chapter 1 Cloud Computing Concepts, Models, and Terminology
    1. Cloud Service Models
      1. Infrastructure as a Service
      2. Platform as a Service
      3. Software as a Service
      4. Database as a Service
      5. Communications as a Service
      6. Business Process as a Service
      7. Anything as a Service
      8. Accountability and the Shared Responsibility Model
    2. Cloud Deployment Models and Services
      1. Private Cloud
      2. Public Cloud
      3. Hybrid Cloud
      4. Community Cloud
      5. Cloud Within a Cloud
      6. On-Premises vs. Off-Premises Hosting
      7. Orchestration Platforms
      8. Multicloud
    3. Cloud Characteristics and Terms
      1. Elasticity
      2. Demand-Driven Service
      3. Pay-as-You-Grow
      4. Chargeback
      5. Ubiquitous Access
      6. Metering
      7. Multitenancy
      8. Cloud Bursting
      9. Baselines
      10. Source and Target Hosts
      11. Existing Systems
      12. Cloud Elements
    4. Advanced Cloud Services
      1. Machine Learning and Artificial Intelligence
      2. Serverless
      3. Exercise 1-1: Creating a Basic Serverless Application on AWS Lambda
      4. Internet of Things
    5. Chapter Review
      1. Questions
      2. Answers
  9. Chapter 2 Disk Storage Systems
    1. Disk Types and Configurations
      1. Rotational Media
      2. Solid State Drive
      3. USB Drive
      4. Tape
      5. Interface Types
      6. Access Speed
      7. Redundant Array of Independent Disks (RAID)
      8. Write Once, Read Many (WORM)
    2. Tiering
      1. Performance Levels of Each Tier
      2. Policies
    3. File System Types
      1. Unix File System
      2. Extended File System
      3. File Allocation Table File System
      4. New Technology File System
      5. Exercise 2-1: Formatting a Disk with the NTFS Partition in Windows
      6. Resilient File System
      7. Virtual Machine File System
      8. Z File System
    4. Chapter Review
      1. Questions
      2. Answers
  10. Chapter 3 Storage Networking
    1. Storage Types and Technologies
      1. Direct Attached Storage
      2. Storage Area Network
      3. Network Attached Storage
      4. Object Storage
      5. Exercise 3-1: Creating Object Storage
      6. Deduplication Technologies
      7. Compression Technologies
      8. Data BLOB
    2. Storage Access Protocols
      1. Fibre Channel
      2. Fibre Channel Protocol
      3. Fibre Channel over Ethernet
      4. Ethernet
      5. TCP/IP
      6. Internet Fibre Channel Protocol
      7. Internet Small Computer System Interface
      8. Nonvolatile Memory Express Over Fabrics
    3. Storage Provisioning
      1. Performance
      2. Logical Unit Numbers
      3. Network Shares
      4. Zoning and LUN Masking
      5. Multipathing
      6. Provisioning Model
      7. Encryption Requirements
      8. Tokenization
    4. Storage Protection
      1. High Availability
      2. Storage Replication
    5. Chapter Review
      1. Questions
      2. Answers
  11. Chapter 4 Network Infrastructure
    1. Network Types
      1. Intranet
      2. Internet
      3. Extranet
    2. Network Optimization
      1. Network Scope
      2. Network Topologies
      3. Bandwidth and Latency
      4. Load Balancing
      5. Network Service Tiers
      6. Exercise 4-1: Configuring Network Service Tiers in Google Cloud
      7. Proxy Servers
      8. Content Delivery Network
    3. Routing and Switching
      1. Network Address Translation
      2. Port Address Translation
      3. Subnetting and Supernetting
      4. Routing Tables
      5. Network Segmentation and Micro-segmentation
    4. Network Ports and Protocols
      1. Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure
      2. File Transfer Protocol and FTP over SSL
      3. Secure Shell File Transfer Protocol
      4. Domain Name System
      5. Dynamic Host Configuration Protocol
      6. IP Address Management
      7. Simple Mail Transfer Protocol
      8. Network Time Protocol
      9. Well-Known Ports
    5. Chapter Review
      1. Questions
      2. Answers
  12. Chapter 5 Virtualization Components
    1. Hypervisor
      1. Type 1
      2. Type 2
      3. Proprietary
      4. Open Source
      5. Consumer vs. Enterprise
    2. Virtualization Host
      1. Hardware-Assisted Virtualization
      2. Single Root Input/Output Virtualization
      3. BIOS
      4. UEFI
      5. Firmware Configurations
      6. Hyperconverged Systems and Infrastructure
    3. VM Sizing Considerations
      1. CPU
      2. GPU
      3. Memory
      4. NIC
      5. Exercise 5-1: Creating a Virtual Switch in Hyper-V
    4. Virtual Machine
      1. Virtual Disks
      2. vNIC
      3. Virtual Switches
      4. Memory
      5. Storage Virtualization
      6. Guest Tools
      7. Exercise 5-2: Creating a Virtual Machine in Hyper-V
    5. Virtualized Infrastructure Service Elements
      1. DNS
      2. DHCP
      3. Certificate Services
      4. Local Agents
      5. Antivirus
      6. Load Balancing
      7. Multifactor Authentication
      8. Firewall
      9. IDS/IPS
    6. Chapter Review
      1. Questions
      2. Answers
  13. Chapter 6 Virtualization and the Cloud
    1. Benefits of Virtualization in a Cloud Environment
      1. Shared Resources
      2. Elasticity
      3. Network and Application Isolation
      4. Infrastructure Consolidation
      5. Virtual Data Center Creation
    2. Virtual Resource Migrations
      1. Virtual Machine Templates
      2. Physical to Virtual
      3. Virtual to Virtual
      4. Virtual to Physical
      5. Physical to Physical
      6. Virtual Machine Cloning
      7. Virtual Machine Snapshots
      8. Clones vs. Snapshots
      9. Storage Migration
      10. Host Clustering and HA/DR
      11. Cloud Provider Migrations
      12. Exercise 6-1: Creating a Cloud Firewall on Azure
    3. Migration Considerations
      1. Requirements Gathering
      2. Migration Scheduling
      3. Upgrading
      4. Testing
      5. Databases
    4. Software Defined
      1. Software Defined Network
      2. Software Defined Storage
      3. Software Defined Data Center
    5. Chapter Review
      1. Questions
      2. Answers
  14. Chapter 7 Cloud Adoption
    1. Planning
      1. Requirement Analysis
      2. Designing a Solution
      3. Selection
      4. Deployment Plan
      5. Approval
    2. Implementation
      1. Service Model Solutions
      2. Solutions
      3. Deploying Virtual Systems
      4. Networking
      5. Exercise 7-1: Creating a Virtual Network in Azure
      6. Exercise 7-2: Creating a Default Route on Azure
      7. Containers
    3. Post-Deployment Validation
    4. Remote Access Tools
      1. Remote Hypervisor Access
      2. RDP
      3. Console Port
      4. SSH
      5. HTTP
    5. Chapter Review
      1. Questions
      2. Answers
  15. Chapter 8 DevOps
    1. Application Life Cycle
      1. Phase 1: Specifications
      2. Phase 2: Development
      3. Phase 3: Testing
      4. Phase 4: Deployment
      5. Phase 5: Maintenance
      6. Life Cycle Management
    2. Ending Applications
      1. Application Replacement
      2. Application Retirement
      3. Application Migration
      4. Application Feature Use (Increase/Decrease)
    3. Secure Coding
      1. Avoid Hardcoded Passwords
      2. Service Account Best Practices
      3. Password Vaults
      4. Key-Based Authentication
      5. Exercise 8-1: Setting Up SSH Keys for Key-Based Authentication
    4. DevOps Cloud Transformation
      1. Business Needs Change
      2. Continuous Integration/Continuous Delivery
      3. Infrastructure as Code
    5. Chapter Review
      1. Questions
      2. Answers
  16. Chapter 9 Performance Tuning
    1. Host Resource Allocation
      1. Compute Resources
      2. Quotas and Limits
      3. Licensing
      4. Reservations
      5. Resource Pools
    2. Guest Resource Allocation
      1. Compute Resources
      2. Quotas and Limits
      3. Licensing
      4. Physical Resource Redirection
      5. Resource Pools
      6. Dynamic Resource Allocation
    3. Optimizing Performance
      1. Configuration Best Practices
      2. Exercise 9-1: Setting CPU Affinity and Anti-Affinity Rules in VMWare Cloud
      3. Scalability
      4. Performance Concepts
      5. Performance Automation
    4. Common Performance Issues
      1. Common Disk Issues
      2. Common Memory Issues
      3. Network Issues
      4. Physical Processor Issues
    5. Chapter Review
      1. Questions
      2. Answers
  17. Chapter 10 Systems Management
    1. Policies and Procedures
      1. Standard Operating Procedures
      2. Workflow
      3. Capacity Management
      4. Records Management
    2. Systems Management Best Practices
      1. Documentation
      2. Standardization
      3. Metrics
      4. Dashboards
      5. Planning
    3. Systems Maintenance
      1. Code Updates
      2. Deployment Landscapes
      3. Deployment Methodologies
      4. Patch Management
      5. Exercise 10-1: Configuring Group Policy for Automatic Updates
      6. Component Updates
      7. Maintenance Automation
    4. Monitoring Techniques
      1. Collector Protocols and Methods
      2. Tagging
      3. Log Analysis
      4. Baselines
      5. Thresholds
      6. Trending
      7. Automated Event Responses
      8. Log Scrubbing
      9. Verification of Continuous Monitoring Activities
      10. Management Tools
    5. Chapter Review
      1. Questions
      2. Answers
  18. Chapter 11 Security in the Cloud
    1. Data Security
      1. Encryption
      2. Public Key Infrastructure
      3. Encryption Protocols
      4. Tunneling Protocols
      5. Ciphers
      6. Storage Security
      7. Protected Backups
    2. Network Security
      1. Segmentation
      2. Firewall
      3. DDoS Protection
      4. Packet Capture
      5. Network Flow
      6. IDS/IPS
      7. Packet Broker
      8. APIs
      9. Effects of Cloud Service Models on Security Implementation
    3. Endpoint Protection
      1. Host-Based Firewall
      2. Antivirus/Antimalware
      3. Endpoint Detection and Response
      4. Data Loss Prevention
      5. Exercise 11-1: Creating a DLP Policy for Office 365
      6. NAC
      7. Hardening
      8. Application Whitelisting
      9. Impact of Security Tools to Systems and Services
    4. Access Control
      1. Identification
      2. Authentication
      3. Authorization
      4. Single Sign-On
      5. Federation
      6. Access Control Protocols
      7. Access Control Methodologies
      8. Multifactor Authentication
    5. Chapter Review
      1. Questions
      2. Answers
  19. Chapter 12 Security Best Practices
    1. Cloud Security Engineering
      1. Implementing Layered Security
      2. Protecting Against Availability Attacks
      3. Least Privilege
      4. Separation of Duties
      5. Security Automation
    2. Security Governance and Strategy
      1. Developing Company Security Policies
      2. Account Management Policies
      3. Documenting Security Procedures
      4. Assessment and Auditing
      5. Leveraging Established Industry Standards and Regulations
      6. Applying Platform-Specific Security Standards
      7. Data Classification
      8. Legal Holds
      9. Exercise 12-1: Creating a Legal Hold for a Mailbox in Office 365
      10. Keeping Employees and Tools Up to Date
      11. Roles and Responsibilities
    3. Vulnerability Management
      1. Testing Methods
      2. Vulnerability Scanning
      3. Penetration Testing
      4. Roles and Responsibilities
      5. Considerations Before You Scan or Test
    4. Incident Response
      1. Preparation
      2. Incident Types
      3. Incident Response Procedures
    5. Chapter Review
      1. Questions
      2. Answers
  20. Chapter 13 Business Continuity and Disaster Recovery
    1. Business Continuity Methods
      1. Business Continuity Plan
      2. Contingency
      3. Resiliency
      4. High Availability
      5. Service-Level Agreements for BCP and HA
    2. Disaster Recovery Methods
      1. Corporate Guidelines/Documentation
      2. Replication
      3. File Transfer
      4. Service-Level Agreements for DR
    3. Backup and Recovery
      1. Backup Types
      2. Backup Target
      3. Exercise 13-1: Cross-Region Replication
      4. Other Backup Considerations
      5. Restoration Methods
      6. Archiving
    4. Chapter Review
      1. Questions
      2. Answers
  21. Chapter 14 Testing, Automation, and Changes
    1. Testing Techniques
      1. Baseline Comparisons
      2. Exercise 14-1: Collecting Windows Metrics with Performance Monitor
      3. Performance Testing
      4. Configuration Testing
      5. Testing in the Cloud Landscape
      6. Functional Testing
      7. Regression Testing
      8. Usability Testing
      9. SLA Comparisons
      10. Testing Sizing Changes
      11. Testing High Availability
      12. Testing Load Balancing
      13. Testing Connectivity
      14. Verifying Data Integrity
      15. Evaluating Replication
    2. Automation and Orchestration
      1. Event Orchestration
      2. Scripting
      3. Custom Programming
      4. Runbook Management for Single Nodes
      5. Orchestration for Multiple Nodes and Runbooks
      6. Automation Activities
    3. Change and Configuration Management
      1. Change Management
      2. Configuration Management
    4. Chapter Review
      1. Questions
      2. Answers
  22. Chapter 15 Troubleshooting
    1. Troubleshooting Methodology
    2. Troubleshooting Steps
      1. Security Issues
      2. Exercise 15-1: Using the Google Cloud Policy Troubleshooter
      3. Deployment Issues
      4. Connectivity Issues
      5. Performance Issues
      6. Capacity Issues
      7. Automation and Orchestration Issues
    3. Documentation and Analysis
      1. Documentation
      2. Log Files
    4. Troubleshooting Tools
      1. Connectivity Tools
      2. Configuration Tools
      3. Query Tools
      4. Remote Administration Tools
    5. Chapter Review
      1. Questions
      2. Answers
  23. Appendix A Objective Map
    1. Exam CV0-003
  24. Appendix B About the Online Content
    1. System Requirements
    2. Your Total Seminars Training Hub Account
      1. Privacy Notice
    3. Single User License Terms and Conditions
    4. TotalTester Online
      1. Performance-Based Questions
    5. Technical Support
  25. Index

Product information

  • Title: CompTIA Cloud+ Certification All-in-One Exam Guide (Exam CV0-003)
  • Author(s): Eric A. Vanderburg
  • Release date: July 2021
  • Publisher(s): McGraw-Hill
  • ISBN: 9781264264865