Published by Pearson IT Certification (February 18, 2022) © 2022

William Rothwell
    VitalSource eTextbook (Lifetime access)
    €34,99
    Adding to cart… The item has been added
    ISBN-13: 9780137393152

    CompTIA Cloud+ CV0-003 Exam Cram ,1st edition

    Language: English

    CompTIA® Cloud+ CV0-003 Exam Cram is an all-inclusive study guide designed to help you pass the updated version of the CompTIA Cloud+ exam. Prepare for test day success with complete coverage of exam objectives and topics, plus hundreds of realistic practice questions. Extensive prep tools include quizzes and our essential last-minute review CramSheet. The powerful Pearson Test Prep practice software provides real-time assessment and feedback with two complete exams.


    Covers the critical information needed to score higher on your Cloud+ CV0-003 exam!


    • Understand Cloud architecture and design
    • Secure a network in a Cloud environment
    • Apply data security and compliance controls and implement measures to meet security requirements
    • Deploy Cloud networking solutions
    • Perform Cloud migrations
    • Optimize and maintain efficient operation of a Cloud environment
    • Understand disaster recovery tasks
    • Troubleshoot security, deployment, connectivity, and other performance issues


    Prepare for your exam with Pearson Test Prep


    • Realistic practice questions and answers
    • Comprehensive reporting and feedback
    • Customized testing in study, practice exam, or flash card modes
    • Complete coverage of Cloud+ CV0-003 exam objectives

    Introduction. . . . . . . . . . . . . . . . . . . . . . . xxvi

    CHAPTER 1: Different Types of Cloud Models.. . . . . . . . . . . . . . . . 1

        Cloud Deployment Models.. . . . . . . . . . . . . . . . 2

        Cloud Service Models.. . . . . . . . . . . . . . . . . . 6

        Advanced Cloud Services.. . . . . . . . . . . . . . . . . 9

        Cloud Shared Responsibility Model. . . . . . . . . . . . . 11

        What Next?.. . . . . . . . . . . . . . . . . . . . . 14

    CHAPTER 2: Capacity Planning.. . . . . . . . . . . . . . . . . . . . . 15

        Requirements.. . . . . . . . . . . . . . . . . . . . . 16

        Standard Templates.. . . . . . . . . . . . . . . . . . . 18

        Licensing.. . . . . . . . . . . . . . . . . . . . . . 18

        User Density.. . . . . . . . . . . . . . . . . . . . . 20

        System Load. . . . . . . . . . . . . . . . . . . . . 21

        Trend Analysis.. . . . . . . . . . . . . . . . . . . . 21

        Performance Capacity Planning.. . . . . . . . . . . . . . 22

        What Next?.. . . . . . . . . . . . . . . . . . . . . 24

    CHAPTER 3: High Availability and Scaling in Cloud Environments.. . . . . . . . 25

        Hypervisors.. . . . . . . . . . . . . . . . . . . . . 26

        Oversubscription. . . . . . . . . . . . . . . . . . . . 28

        Regions and Zones.. . . . . . . . . . . . . . . . . . . 30

        Applications.. . . . . . . . . . . . . . . . . . . . . 32

        Containers.. . . . . . . . . . . . . . . . . . . . . . 32

        Clusters.. . . . . . . . . . . . . . . . . . . . . . . 33

        High Availability of Network Functions.. . . . . . . . . . . . 33

        Avoid Single Points of Failure. . . . . . . . . . . . . . . 36

        Scalability.. . . . . . . . . . . . . . . . . . . . . . 36

        What Next?.. . . . . . . . . . . . . . . . . . . . . 39

    CHAPTER 4: Solution Design in Support of the Business Requirements.. . . . . . 41

        Requirement Analysis.. . . . . . . . . . . . . . . . . . 42

        Environments. . . . . . . . . . . . . . . . . . . . . 48

        Testing Techniques.. . . . . . . . . . . . . . . . . . . 50

        What Next?.. . . . . . . . . . . . . . . . . . . . . 53

    CHAPTER 5: Identity and Access Management.. . . . . . . . . . . . . . . 55

        Identification and Authorization.. . . . . . . . . . . . . . 56

        Directory Services. . . . . . . . . . . . . . . . . . . 60

        Federation.. . . . . . . . . . . . . . . . . . . . . . 61

        Certificate Management. . . . . . . . . . . . . . . . . 63

        Multifactor Authentication (MFA).. . . . . . . . . . . . . . 64

        Single Sign-On (SSO).. . . . . . . . . . . . . . . . . . 65

        Public Key Infrastructure (PKI).. . . . . . . . . . . . . . 66

        Secret Management. . . . . . . . . . . . . . . . . . . 67

        Key Management.. . . . . . . . . . . . . . . . . . . 67

        What Next?.. . . . . . . . . . . . . . . . . . . . . 69

    CHAPTER 6: Secure a Network in a Cloud Environment. . . . . . . . . . . . 71

        Network Segmentation.. . . . . . . . . . . . . . . . . 72

        Protocols.. . . . . . . . . . . . . . . . . . . . . . 74

        Network Services.. . . . . . . . . . . . . . . . . . . 77

        Log and Event Monitoring. . . . . . . . . . . . . . . . 80

        Network Flows.. . . . . . . . . . . . . . . . . . . . 80

        Hardening and Configuration Changes.. . . . . . . . . . . . 81

        What Next?.. . . . . . . . . . . . . . . . . . . . . 86

    CHAPTER 7: OS and Application Security Controls.. . . . . . . . . . . . . . 87

        Policies.. . . . . . . . . . . . . . . . . . . . . . . 88

        User Permissions.. . . . . . . . . . . . . . . . . . . 90

        Antivirus/Antimalware/Endpoint Detection and Response (EDR).. . . 93

        Host-Based IDS (HIDS)/Host-Based IPS (HIPS).. . . . . . . . 94

        Hardened Baselines.. . . . . . . . . . . . . . . . . . . 94

        File Integrity.. . . . . . . . . . . . . . . . . . . . . 96

        Log and Event Monitoring. . . . . . . . . . . . . . . . 96

        Configuration Management.. . . . . . . . . . . . . . . . 96

        Builds.. . . . . . . . . . . . . . . . . . . . . . . 96

        Operating System (OS) Upgrades.. . . . . . . . . . . . . . 98

        Encryption. . . . . . . . . . . . . . . . . . . . . . 98

        Mandatory Access Control.. . . . . . . . . . . . . . . . 99

        Firewall Software.. . . . . . . . . . . . . . . . . . . 100

        What Next?.. . . . . . . . . . . . . . . . . . . . . 101

    CHAPTER 8: Data Security and Compliance Controls in Cloud Environments.. . . . 103

        Encryption. . . . . . . . . . . . . . . . . . . . . . 104

        Integrity.. . . . . . . . . . . . . . . . . . . . . . 105

        Classification.. . . . . . . . . . . . . . . . . . . . . 107

        Segmentation.. . . . . . . . . . . . . . . . . . . . . 108

        Access Control.. . . . . . . . . . . . . . . . . . . . 108

        Impact of Laws and Regulations.. . . . . . . . . . . . . . 109

        Records Management.. . . . . . . . . . . . . . . . . . 110

        Data Loss Prevention (DLP).. . . . . . . . . . . . . . . 111

        Cloud Access Security Broker (CASB).. . . . . . . . . . . . 111

        What Next?.. . . . . . . . . . . . . . . . . . . . . 113

    CHAPTER 9: Security Requirements.. . . . . . . . . . . . . . . . . . . 115

        Tools.. . . . . . . . . . . . . . . . . . . . . . . . 116

        Vulnerability Assessment.. . . . . . . . . . . . . . . . . 117

        Security Patches.. . . . . . . . . . . . . . . . . . . . 118

        Risk Register.. . . . . . . . . . . . . . . . . . . . . 120

        Prioritization of Patch Applications.. . . . . . . . . . . . . 120

        Deactivate Default Accounts. . . . . . . . . . . . . . . . 120

        Impacts of Security Tools on Systems and Services.. . . . . . . . 121

        What Next?.. . . . . . . . . . . . . . . . . . . . . 122

    CHAPTER 10: Incident Response Procedures.. . . . . . . . . . . . . . . . 123

        Preparation.. . . . . . . . . . . . . . . . . . . . . 124

        Incident Response Procedures.. . . . . . . . . . . . . . . 130

        What Next?.. . . . . . . . . . . . . . . . . . . . . 134

    CHAPTER 11: Integrate Components into a Cloud Solution.. . . . . . . . . . . 135

        Subscription Services. . . . . . . . . . . . . . . . . . 136

        Provisioning Resources.. . . . . . . . . . . . . . . . . 140

        Application. . . . . . . . . . . . . . . . . . . . . . 142

        Deploying Virtual Machines (VMs) and Custom Images. . . . . . 143

        Templates. . . . . . . . . . . . . . . . . . . . . . 143

        Identity Management.. . . . . . . . . . . . . . . . . . 145

        Containers.. . . . . . . . . . . . . . . . . . . . . . 145

        Auto-scaling.. . . . . . . . . . . . . . . . . . . . . 146

        Postdeployment Validation.. . . . . . . . . . . . . . . . 146

        What Next?.. . . . . . . . . . . . . . . . . . . . . 148

    CHAPTER 12: Storage in Cloud Environments. . . . . . . . . . . . . . . . 149

        Types. . . . . . . . . . . . . . . . . . . . . . . . 150

        Tiers.. . . . . . . . . . . . . . . . . . . . . . . . 152

        Input/Output Operations per Second (IOPS) and Read/Write.. . . . 153

        Protocols.. . . . . . . . . . . . . . . . . . . . . . 154

        Redundant Array of Inexpensive Disks (RAID).. . . . . . . . . 157

        Storage System Features.. . . . . . . . . . . . . . . . . 159

        User Quotas. . . . . . . . . . . . . . . . . . . . . 161

        Hyperconverged.. . . . . . . . . . . . . . . . . . . . 161

        Software-Defined Storage (SDS). . . . . . . . . . . . . . 162

        What Next?.. . . . . . . . . . . . . . . . . . . . . 163

    CHAPTER 13: Cloud Networking Solutions.. . . . . . . . . . . . . . . . . 165

        Services.. . . . . . . . . . . . . . . . . . . . . . . 166

        Virtual Private Networks (VPNs).. . . . . . . . . . . . . . 170

        Virtual Routing. . . . . . . . . . . . . . . . . . . . 171

        Network Appliances.. . . . . . . . . . . . . . . . . . 176

        Virtual Private Cloud (VPC). . . . . . . . . . . . . . . . 177

        VLAN/VxLAN/GENEVE. . . . . . . . . . . . . . . . 178

        Single Root Input/Output Virtualization (SR-IOV).. . . . . . . . 179

        Software-Defined Network (SDN).. . . . . . . . . . . . . 179

        What Next?.. . . . . . . . . . . . . . . . . . . . . 180

    CHAPTER 14: Compute Sizing for a Deployment. . . . . . . . . . . . . . . 181

        Virtualization.. . . . . . . . . . . . . . . . . . . . . 182

        Central Processing Unit (CPU)/ Virtual CPU (vCPU). . . . . . . 185

        Graphics Processing Unit (GPU).. . . . . . . . . . . . . . 186

        Clock Speed/Instructions per Cycle (IPC).. . . . . . . . . . . 187

        Hyperconverged.. . . . . . . . . . . . . . . . . . . . 188

        Memory. . . . . . . . . . . . . . . . . . . . . . . 188

        What Next?.. . . . . . . . . . . . . . . . . . . . . 191

    CHAPTER 15: Cloud Migrations.. . . . . . . . . . . . . . . . . . . . . 193

        Physical to Virtual (P2V).. . . . . . . . . . . . . . . . . 194

        Virtual to Virtual (V2V).. . . . . . . . . . . . . . . . . 195

        Cloud-to-Cloud Migrations.. . . . . . . . . . . . . . . . 196

        Storage Migrations.. . . . . . . . . . . . . . . . . . . 198

        Database Migrations.. . . . . . . . . . . . . . . . . . 200

        What Next?.. . . . . . . . . . . . . . . . . . . . . 203

    CHAPTER 16: Logging, Monitoring, and Alerting.. . . . . . . . . . . . . . . 205

        Logging. . . . . . . . . . . . . . . . . . . . . . . 206

        Monitoring.. . . . . . . . . . . . . . . . . . . . . 209

        Alerting.. . . . . . . . . . . . . . . . . . . . . . . 214

        What Next?.. . . . . . . . . . . . . . . . . . . . . 216

    CHAPTER 17: Operation of a Cloud Environment.. . . . . . . . . . . . . . . 217

        Confirm Completion of Backups. . . . . . . . . . . . . . 218

        Lifecycle Management. . . . . . . . . . . . . . . . . . 218

        Change Management. . . . . . . . . . . . . . . . . . 220

        Asset Management.. . . . . . . . . . . . . . . . . . . 220

        Patching.. . . . . . . . . . . . . . . . . . . . . . 221

        Impacts of Process Improvements on Systems. . . . . . . . . . 226

        Upgrade Methods.. . . . . . . . . . . . . . . . . . . 226

        Dashboard and Reporting.. . . . . . . . . . . . . . . . 228

        What Next?.. . . . . . . . . . . . . . . . . . . . . 234

    CHAPTER 18: Optimize Cloud Environments. . . . . . . . . . . . . . . . . 235

        Right-sizing.. . . . . . . . . . . . . . . . . . . . . 236

        Compute and Storage.. . . . . . . . . . . . . . . . . . 236

        Network.. . . . . . . . . . . . . . . . . . . . . . 237

        Placement.. . . . . . . . . . . . . . . . . . . . . . 242

        Geographical.. . . . . . . . . . . . . . . . . . . 242

        Device Drivers and Firmware.. . . . . . . . . . . . . . . 243

        What Next?.. . . . . . . . . . . . . . . . . . . . . 246

    CHAPTER 19: Automation and Orchestration Techniques.. . . . . . . . . . . . 247

        Infrastructure as Code (IaC).. . . . . . . . . . . . . . . . 248

        Continuous Integration/Continuous Deployment (CI/CD).. . . . . 249

        Version Control.. . . . . . . . . . . . . . . . . . . . 250

        Configuration Management.. . . . . . . . . . . . . . . . 251

        Containers.. . . . . . . . . . . . . . . . . . . . . . 252

        Automation Activities.. . . . . . . . . . . . . . . . . . 252

        Secure Scripting.. . . . . . . . . . . . . . . . . . . . 254

        Orchestration Sequencing.. . . . . . . . . . . . . . . . 255

        What Next?.. . . . . . . . . . . . . . . . . . . . . 257

    CHAPTER 20: Backup and Restore Operations.. . . . . . . . . . . . . . . . 259

        Backup Types.. . . . . . . . . . . . . . . . . . . . . 260

        Backup Objects. . . . . . . . . . . . . . . . . . . . 263

        Backup Targets.. . . . . . . . . . . . . . . . . . . . 265

        Backup and Restore Policies.. . . . . . . . . . . . . . . . 266

        Restoration Methods.. . . . . . . . . . . . . . . . . . 269

        What Next?.. . . . . . . . . . . . . . . . . . . . . 272

    CHAPTER 21: Disaster Recovery Tasks.. . . . . . . . . . . . . . . . . . 273

        Failovers.. . . . . . . . . . . . . . . . . . . . . . 274

        Failback.. . . . . . . . . . . . . . . . . . . . . . . 274

        Restore Backups.. . . . . . . . . . . . . . . . . . . . 275

        Replication. . . . . . . . . . . . . . . . . . . . . . 275

        On-Premises and Cloud Sites.. . . . . . . . . . . . . . . 275

        Requirements.. . . . . . . . . . . . . . . . . . . . . 277

        Documentation. . . . . . . . . . . . . . . . . . . . 277

        Geographical Data Center Requirements.. . . . . . . . . . . 279

        What Next?.. . . . . . . . . . . . . . . . . . . . . 280

    CHAPTER 22: Troubleshooting Methodology. . . . . . . . . . . . . . . . . 281

        Always Consider Corporate Policies, Procedures, and Impacts Before

        Implementing Changes.. . . . . . . . . . . . . . . . . 282

        1. Identify the Problem.. . . . . . . . . . . . . . . . . 283

        2. Establish a Theory of Probable Cause (Question the Obvious).. . . 284

        3. Test the Theory to Determine Cause.. . . . . . . . . . . . 285

        4. Establish a Plan of Action to Resolve the Problem and Implement the Solution... 285

        5. Verify Full System Functionality and, if Applicable, Implement Preventive Measures.. 286

        6. Document the Findings, Actions, and Outcomes Throughout the Process.. . 286

        What Next?.. . . . . . . . . . . . . . . . . . . . . 288

    CHAPTER 23: Troubleshoot Security Issues.. . . . . . . . . . . . . . . . . 289

        Privilege.. . . . . . . . . . . . . . . . . . . . . . 290

        Authentication.. . . . . . . . . . . . . . . . . . . . 291

        Authorization.. . . . . . . . . . . . . . . . . . . . . 292

        Security Groups.. . . . . . . . . . . . . . . . . . . . 293

        Keys and Certificates. . . . . . . . . . . . . . . . . . 294

        Misconfigured or Misapplied Policies.. . . . . . . . . . . . 295

        Data Security Issues. . . . . . . . . . . . . . . . . . . 296

        Exposed Endpoints.. . . . . . . . . . . . . . . . . . . 297

        Misconfigured or Failed Security Appliances. . . . . . . . . . 298

        Unsupported Protocols.. . . . . . . . . . . . . . . . . 298

        External/Internal Attacks.. . . . . . . . . . . . . . . . . 298

        What Next?.. . . . . . . . . . . . . . . . . . . . . 300

    CHAPTER 24: Troubleshoot Deployment, Automation, and Orchestration Issues.. . . 301

        Connectivity Issues.. . . . . . . . . . . . . . . . . . . 302

        Performance Degradation.. . . . . . . . . . . . . . . . 304

        Configurations.. . . . . . . . . . . . . . . . . . . . 305

        Applications in Containers.. . . . . . . . . . . . . . . . 306

        Misconfigured Templates.. . . . . . . . . . . . . . . . . 306

        Missing or Incorrect Tags. . . . . . . . . . . . . . . . . 306

        Insufficient Capacity.. . . . . . . . . . . . . . . . . . 307

        Licensing Issues.. . . . . . . . . . . . . . . . . . . . 307

        Vendor-Related Issues.. . . . . . . . . . . . . . . . . . 308

        Account Mismatches.. . . . . . . . . . . . . . . . . . 310

        Change Management Failures. . . . . . . . . . . . . . . 310

        Server Name Changes.. . . . . . . . . . . . . . . . . . 311

        IP Address Changes. . . . . . . . . . . . . . . . . . . 311

        Location Changes.. . . . . . . . . . . . . . . . . . . 312

        Version/Feature Mismatch.. . . . . . . . . . . . . . . . 312

        Automation Tool Incompatibility. . . . . . . . . . . . . . 313

        Job Validation Issue.. . . . . . . . . . . . . . . . . . . 314

        Patching Failure.. . . . . . . . . . . . . . . . . . . . 315

        What Next?.. . . . . . . . . . . . . . . . . . . . . 316

    CHAPTER 25: Troubleshoot Connectivity Issues and Common Performance Issues.. . 317

        Network Security Group Misconfigurations.. . . . . . . . . . 318

        Common Networking Configuration Issues.. . . . . . . . . . 319

        Network Troubleshooting Tools.. . . . . . . . . . . . . . 324

        Resource Utilization.. . . . . . . . . . . . . . . . . . 336

        Application. . . . . . . . . . . . . . . . . . . . . . 337

        Incorrectly Configured or Failed Load Balancing.. . . . . . . . 338

        What Next?.. . . . . . . . . . . . . . . . . . . . . 339

    Glossary of Essential Terms and Components.. . . . . . . . . . . 341



    9780137393251, TOC, 10/21/2021