CompTIA Cloud+ Certification Guide (Exam CV0-003): Everything you need to know to pass the CompTIA Cloud+ CV0-003 exam
9789355513847
Your complete resource for CompTIA Cloud+ CV0-003 certification.
Key Features: - Gain a solid understanding of the fund
129
47
6MB
English
Pages 294
Year 2023
Report DMCA / Copyright
DOWNLOAD EPUB FILE
Table of contents :
Cover
Title Page
Copyright Page
Dedication Page
About the Author
About the Reviewer
Acknowledgement
Preface
Table of Contents
1. Introduction to CV0-003 Exam
Introduction
Structure
About CompTIA®
About CV0-003 exam
Who should take this exam?
About this book
Exam readiness checklist
2. Overview of Cloud Computing
Introduction
Structure
History of cloud computing
Innovations in networking
Innovations in computing
Cloud service offerings
Software as a Service (SaaS)
Platform as a Service (PaaS)
Infrastructure as a Service (IaaS)
Desktop as a Service (DaaS)
Anything as a Service (XaaS)
Cloud delivery models
Private cloud
Public cloud
Hybrid cloud
Community cloud
Common cloud jargon
Cloud developer beginner questions
Conclusion
3. Managing Virtual Machines
Introduction
Objectives
Structure
Overview of Virtual Machines
Benefits of virtualization
Exam topics
Hypervisor
Hypervisor types
Types of virtualisation
Virtual machine software
Virtualization - Host machine
BIOS and Firmware
Central Processing Unit (CPU)
Random Access Memory (RAM)
Network Interface Card (NIC)
Virtualization - Virtual machine/Guest machine
Virtual disks
Virtual network interfaces
Virtual network components
Virtual RAM
Tools
Virtual storage
Virtualization as the building block of Cloud computing
Conclusion
Glossary
Practice questions
4. Managing Storage
Introduction
Structure
Objectives
History of computer storage
Traditional storage technologies
Direct Attached Storage (DAS)
Storage medium
Hard disk, tapes, floppies, CDs
Solid State Drive (SSD)
Storage interface types
Data storage architectures
Redundant Array of Independent Disks (RAID)
Storage tiers
File systems
Data security
Performance measurement
Storage capacity metrics
Byte vs Bibite
Throughput and read/write storage metrics
IOPS and latency
Reliability metrics
Networked storage
Storage types
Storage Area Networking (SAN)
Network Attached Storage
Object storage
Access protocols
Fiber Channel Protocol
Ethernet
Tunnelling approaches
Network storage security
High availability
Fault tolerance
Replication
Conclusion
5. Networking Fundamentals
Introduction
Structure
Objectives
Origins of networking
Network protocols
OSI 7-layer architecture
Transmission Control Protocol/Internet Protocol (TCP/IP)
Link layer
Internet layer
Transport layer
Application layer
IPv4, IPv6
Software and hardware ports
Networking topologies
Network types
Intranet
Extranet
Internet
Local Area Networking
MAN
WAN
Wireless Fidelity (Wi-Fi)
Performance management
Bandwidth
Dialups, DSL, broadband and optical fiber
Caching
Load balancing
Network components
Conclusion
Glossary
Practice questions
6. Managing Networks
Introduction
Structure
Objectives
Understanding an IPv4 address
Decoding IPv4 address
Subnet masks
Default gateway
Subnets and supernets
IPv6
Understanding an IPv6 address
Decoding an IPv6 address
Shortening techniques
Interface IDs
Domain Name System (DNS)
Dynamic Host Configuration Protocol (DHCP)
Network Address Translation
Port Address Translation
Routing tables
Networking protocols
The HTTP, HTTPS
The SSH
The FTP, SFTP, TFTP
The SMTP, POP and IMAP
The NTP and NTS
Cloud networks
Network virtualization (NV)
Network function virtualization
Examples of network virtualization
Virtual Private Clouds
Software-Defined Network
The SDN and NV
Conclusion
Glossary
Practice Questions
7. Managing Security
Introduction
Structure
Objectives
Security
CIA triad
Parkerian Hexad
Confidentiality
Identity and access management
Classification levels
Bell-LaPadula model
Integrity
Biba model
Message digests
Encryption
Availability
Denial of Service
Malware and ransomware
Encryption
Symmetric encryption
Asymmetric encryption
Block encryption
Stream encryption
Public key infrastructure
Web of trust scheme
Protocols
SSL/TLS
IPSec
Generic Routing Encapsulation
Point-To-Point Tunnelling Protocol
Layer 2 Tunnelling Protocol (L2TP)
Network security threats
IP spoofing
Ingress filtering
Egress filtering
Man-in-the-middle attacks
Security mechanisms
Segmentation
Antivirus
Firewalls
Intrusion Detection and Prevention
Cloud Security implementations
Systems hardening
Endpoint protection (EPP)
Securing data
Create
Use
Store
Share
Archive
Destroy
API security
Conclusion
Glossary
Practice questions
References
8. Identity and Access Management
Introduction
Objectives
Structure
Identity
Authentication
Multi-factor authentication
Adaptive authentication
Password over a network
LDAP
Federated identity management
Single Sign-on
SAML
OAuth
OpenID
Identification and authentication
Accountability
Authorisation
Access control
Access control models
Kerberos
Conclusion
Glossary
Practice questions
9. Migrating to Cloud
Introduction
Structure
Objectives
Types of migration
Physical-to-physical
Physical-to-virtual
Virtual-to-virtual
Virtual-to-physical
Migration strategies
Rehost
Refactor
Revise
Rebuild
Replace
Re-platform
Relocate
Retire
Migration roadmap
Aligning objectives
Developing action plan
Preparing for execution
Establishing governance and mitigating risk
Optimizing and scaling
Migration life cycle
Planning
Building
Migrating
Application migration
Data migration
Network migration
Security
Billing
Identity and Access migration
Support
Conclusion
Glossary
Practice questions
10. Orchestrating Cloud Applications
Introduction
Objectives
Structure
Automation
Cloud automation use cases
Benefits of cloud automation
Types of automation activities
Scripting
Infrastructure as Code
IaC Tools
Orchestration
Automation vs orchestration
Benefits of orchestration
Cloud Orchestration Models
Event orchestration
Runbook management
Multiple runbooks
Runbook automation
Runbook life cycle
Conclusion
Glossary
Practice Questions
11. Troubleshooting in Cloud
Introduction
Structure
Objectives
CompTIA’s Troubleshooting Methodology
Identify the problem
Establish a theory of probable cause
Test the theory to determine the cause
Establish a plan of action and implement the solution
Verify full system functionality and implement preventive measures
Document findings
Troubleshooting for administrators
Resource allocations on host machines
Licensing
Performance degradation - RAM
Performance degradation – CPU
Performance degradation – storage
Performance degradation – Network
Troubleshooting utilities
Remote access tools
Utilities
Troubleshooting for developers
Logging
Metrics
Traces
Observability
Observability vs monitoring
Application development best practices
Requirement analysis
Environments
Testing techniques
Secure coding
Deployment
Conclusion
Glossary
Practice Questions
12. Disaster Recovery and High Availability
Introduction
Structure
Objectives
Backups and recovery
Full backup
Incremental backup
Differential backup
Synthetic full backup
Mirror backup
Snapshot backup
3-2-1 backup
Grandfather-father-son backup
Archives
Recover versus restore
Business Continuity (BC)
Business continuity planning
Disaster recovery
DR planning
Recovery Point Objective (RPO)
Recovery Time Objective (RTO)
Mean Time Between Failure (MTBF)
Mean Time To Recovery (MTTR)
Service-level agreement (SLA)
Recovery Service Level (RSL)
DR and Cloud
Cloud DR types
Storage
Network
CSP SLAs
Geographically distributed systems
Geo-clustering
High availability
Incident response
Procedures and planning
Testing the recovery plan
Post-mortem analysis
Conclusion
Glossary
Practice questions
13. Public Cloud Services
Introduction
Structure
Objectives
Compute services
Storage services
Networking services
Management services
Identity and security services
Conclusion
References
14. Practice Questions
Introduction
Multiple choice questions
Performance-based questions
Answer key for multiple choice questions
Answer key for performance-based questions
Index