35,99 €
In the newly revised Third Edition of CompTIA Cloud+ Study Guide: Exam CVO-003, expert IT Ben Piper delivers an industry leading resource for anyone preparing for the CompTIA Cloud+ certification and a career in cloud services. The book introduces candidates to the skills and the competencies critical for success in the field and on the exam. The book breaks down challenging cloud management concepts into intuitive and manageable topics, including cloud architecture and design, cloud security, deployment, operations and support, and cloud troubleshooting. It also offers practical study features, like Exam Essentials and challenging chapter review questions. Written in a concise and straightforward style that will be immediately familiar to the hundreds of thousands of readers who have successfully use other CompTIA study guides to further their careers in IT, the book offers: * Efficient and effective training for a powerful certification that opens new and lucrative career opportunities * Fully updated coverage for the new Cloud+ CV0-003 Exam that includes the latest in cloud architecture and design * Access to the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Perfect for everyone preparing for the CompTIA Cloud+ Exam CV0-003 certification, this book is an ideal resource for current and aspiring cloud services professionals seeking an efficient and up-to-date resource that will dramatically improve their ability to maintain, secure, and optimize cloud environments.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 755
Veröffentlichungsjahr: 2021
Cover
Title Page
Copyright
Acknowledgments
About the Author
About the Technical Editor
Introduction
Why Should You Become Certified in Cloud Technologies?
What Does This Book Cover?
Interactive Online Learning Environment and Test Bank
How to Use This Book
How Do You Go About Taking the Exam?
Certification Exam Policies
Tips for Taking Your Cloud+ Exam
Cloud+ Exam Renewal
CompTIA Cloud+ Study Guide: Exam CV0-003 Objective Map
1.0 Cloud Architecture and Design
2.0 Security
3.0 Deployment
4.0 Operations and Support
5.0 Troubleshooting
Reader Support for This Book
Assessment Test
Answers to Assessment Test
Chapter 1: Introducing Cloud Computing Configurations and Deployments
Introducing Cloud Computing
Creating and Validating a Cloud Deployment
Verifying System Requirements
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 2: Cloud Deployments
Executing a Cloud Deployment
Matching Data Center Resources to Cloud Resources
Configuring and Deploying Storage
Performing a Server Migration
Managing User Identities and Roles
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 3: Security in the Cloud
Cloud Security Compliance and Configurations
Access Control
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 4: Implementing Cloud Security
Implementing Security in the Cloud
Automating Cloud Security
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 5: Maintaining Cloud Operations
Applying Security Patches
Updating Cloud Elements
Storage Operations
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 6: Disaster Recovery, Business Continuity, and Ongoing Maintenance
Implementing a Disaster Recovery and Business Continuity Plan
Business Continuity
Cloud Maintenance
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 7: Cloud Management
Cloud Metrics
Adding and Removing Cloud Resources
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 8: Cloud Management Baselines, Performance, and SLAs
Measuring Your Deployment Against the Baseline
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 9: Troubleshooting
Incident Management
Troubleshooting Cloud Capacity Issues
Troubleshooting Automation and Orchestration
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 10: Troubleshooting Networking and Security Issues and Understanding Methodologies
Troubleshooting Cloud Networking Issues
Troubleshooting Security Issues
Troubleshooting Methodology
Summary
Exam Essentials
Written Lab
Review Questions
Appendix A: Answers to Review Questions
Chapter 1: Introducing Cloud Computing Configurations and Deployments
Chapter 2: Cloud Deployments
Chapter 3: Security in the Cloud
Chapter 4: Implementing Cloud Security
Chapter 5: Maintaining Cloud Operations
Chapter 6: Disaster Recovery, Business Continuity, and Ongoing Maintenance
Chapter 7: Cloud Management
Chapter 8: Cloud Management Baselines, Performance, and SLAs
Chapter 9: Troubleshooting
Chapter 10: Troubleshooting Networking and Security Issues and Understanding Methodologies
Appendix B: Answers to Written Labs
Chapter 1: Introducing Cloud Computing Configurations and Deployments
Chapter 2: Cloud Deployments
Chapter 3: Security in the Cloud
Chapter 4: Implementing Cloud Security
Chapter 5: Maintaining Cloud Operations
Chapter 6: Disaster Recovery, Business Continuity, and Ongoing Maintenance
Chapter 7: Cloud Management
Chapter 8: Cloud Management Baselines, Performance, and SLAs
Chapter 9: Troubleshooting
Chapter 10: Troubleshooting Networking and Security Issues and Understanding Methodologies
Index
End User License Agreement
Chapter 2
TABLE 2.1 Private IP address blocks
TABLE 2.2 Role-based access control
Chapter 3
TABLE 3.1 Major components of a PKI framework
Chapter 7
TABLE 7.1 Cloud metric examples
Chapter 1
FIGURE 1.1 In-house computing
FIGURE 1.2 Cloud computing model
FIGURE 1.3 Mainframe computing
FIGURE 1.4 Client-server computing
FIGURE 1.5 Virtualized computing
FIGURE 1.6 Cloud computing
FIGURE 1.7 SaaS
FIGURE 1.8 IaaS
FIGURE 1.9 PaaS
FIGURE 1.10 Public cloud
FIGURE 1.11 Private cloud
FIGURE 1.12 Community cloud
FIGURE 1.13 Hybrid cloud
FIGURE 1.14 Shared resource pooling
FIGURE 1.15 Remote VPN access to a data center
FIGURE 1.16 Site-to-site replication of data
FIGURE 1.17 Synchronous replication
FIGURE 1.18 Asynchronous replication
FIGURE 1.19 Load balancing web servers
FIGURE 1.20 Cloud regions
FIGURE 1.21 Availability zones
FIGURE 1.22 Local computer running the hypervisor management application
FIGURE 1.23 Remote hypervisor management application
FIGURE 1.24 Local computer running Remote Desktop Services to remotely acces...
FIGURE 1.25 Secure Shell encrypted remote access
Chapter 2
FIGURE 2.1 Managing your cloud deployment
FIGURE 2.2 The FCAPS management umbrella
FIGURE 2.3 Public cloud
FIGURE 2.4 Private cloud
FIGURE 2.5 Hybrid cloud
FIGURE 2.6 Community cloud
FIGURE 2.7 A VPN creates a secure tunnel over an insecure network such as th...
FIGURE 2.8 Intrusion detection systems monitor incoming network traffic for ...
FIGURE 2.9 Intrusion prevention systems monitor activity and prevent network...
FIGURE 2.10 DMZ servers are accessed by the outside world via the Internet a...
FIGURE 2.11 Network-attached storage
FIGURE 2.12 Direct-attached storage
FIGURE 2.13 Storage area network
FIGURE 2.14 RAID level 0
FIGURE 2.15 RAID level 1
FIGURE 2.16 RAID level 1+0
FIGURE 2.17 RAID level 0+1
FIGURE 2.18 RAID level 5
FIGURE 2.19 RAID level 6
FIGURE 2.20 Zoning filters access to storage resources on the SAN switching ...
FIGURE 2.21 LUN masking filters initiator access to storage volumes on the s...
FIGURE 2.22 Physical-to-virtual migration
FIGURE 2.23 Virtual-to-virtual migration
FIGURE 2.24 Virtual-to-physical migration
FIGURE 2.25 Storage migration
FIGURE 2.26 Load-balancing web servers
FIGURE 2.27 Network firewall for security
FIGURE 2.28 Firewalls define what traffic is allowed in and out of the netwo...
Chapter 3
FIGURE 3.1 IPsec tunnel from remote site to cloud data center
FIGURE 3.2 IaaS security model
FIGURE 3.3 PaaS security model
FIGURE 3.4 SaaS security model
Chapter 4
FIGURE 4.1 Multifactor authentication login screen
FIGURE 4.2 Hardware-based multifactor authentication token
FIGURE 4.3 Smartphone-based multifactor authentication token
FIGURE 4.4 Dashboard applications show cloud health reports using a browser....
FIGURE 4.5 Firewalls define what traffic is allowed in and out of the networ...
Chapter 5
FIGURE 5.1 Rolling updates are performed sequentially.
FIGURE 5.2 Blue-green deployment
FIGURE 5.3 Cluster updates on each server with no downtime
FIGURE 5.4 Virtual machine snapshot
FIGURE 5.5 Virtual machine cloning
FIGURE 5.6 Image backup
FIGURE 5.7 File backup
FIGURE 5.8 Local backup
FIGURE 5.9 Remote backup
Chapter 6
FIGURE 6.1 Hot site mirroring
FIGURE 6.2 Warm site
FIGURE 6.3 Cold site
FIGURE 6.4 Site-to-site replication of data
FIGURE 6.5 Synchronous replication
FIGURE 6.6 Asynchronous replication
Chapter 7
FIGURE 7.1 Basic network management topology
FIGURE 7.2 Cloud notification system
FIGURE 7.3 Vertical scaling
FIGURE 7.4 Horizontal scaling
Chapter 8
FIGURE 8.1 Cloud object tracking
FIGURE 8.2 CPU usage reporting
FIGURE 8.3 Collecting trending data
FIGURE 8.4 Vertical scaling
FIGURE 8.5 Horizontal scaling
FIGURE 8.6 Cloud reporting
Chapter 10
FIGURE 10.1 Latency is an end-to-end network delay.
FIGURE 10.2 Console port access
FIGURE 10.3 Console port access
FIGURE 10.4 Local computer running the RDP application to remotely access a ...
FIGURE 10.5 Secure Shell–encrypted remote access
FIGURE 10.6 Account privilege escalation
FIGURE 10.7 Top-down troubleshooting approach
FIGURE 10.8 Bottom-up troubleshooting approach
FIGURE 10.9 Divide-and-conquer troubleshooting approach
Cover
Table of Contents
Title Page
Copyright
Acknowledgments
About the Author
About the Technical Editor
Introduction
Begin Reading
Appendix A: Answers to Review Questions
Appendix B: Answers to Written Labs
Index
End User License Agreement
i
v
vi
vii
ix
xi
xxiii
xxiv
xxv
xxvi
xxvii
xxviii
xxix
xxx
xxxi
xxxii
xxxiii
xxxiv
xxxv
xxxvi
xxxvii
xxxviii
xxxix
xl
xli
xlii
xliii
xliv
xlv
xlvi
xlvii
xlviii
xlix
l
li
lii
liii
liv
lv
lvi
lvii
lviii
lix
lx
lxi
lxii
lxiii
lxiv
lxv
lxvi
lxvii
lxviii
lxix
lxx
lxxi
lxxii
lxxiii
lxxiv
lxxv
lxxvi
lxxvii
lxxviii
lxxix
lxxx
lxxxi
lxxxii
lxxxiii
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
Third Edition
Ben Piper
Copyright © 2021 by John Wiley & Sons, Inc. All rights reserved.
Published by John Wiley & Sons, Inc., Hoboken, New Jersey.
Published simultaneously in Canada.
ISBN: 978-1-119-81086-5
ISBN: 978-1-119-81094-0 (ebk.)
ISBN: 978-1-119-81095-7 (ebk.)
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4470, or on the web at www.copyright.com . Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permission .
Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.
For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic formats. For more information about Wiley products, visit our web site at www.wiley.com .
Library of Congress Control Number: 2021942883
TRADEMARKS: WILEY and the Wiley logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. CompTIA and Cloud+ are registered trademarks of CompTIA, Inc. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.
Cover image: © Jeremy Woodhouse/Getty Images, Inc.
Cover design: Wiley
There are many people who work to put a book together, and it would never be published without the dedicated, hard work of the whole team at Wiley. They are truly a fantastic group to work with, and without the Wiley team this book would have never been possible. To everyone at Wiley, a big thank-you! You made the late nights and long weekends of writing and putting this book together all worthwhile.
Special thanks to Kenyon Brown, senior acquisitions editor, who was always ready to provide resources and answer questions. His experience and guidance throughout the project were critical.
Gary Schwartz, project manager, kept this book's publishing schedule on track. His edits helped make many of the technical parts of this book more readable. Thanks also to Christine O'Connor, managing editor, Pete Gaughan, content enablement manager, and Liz Welch, copy editor.
Kunal Mittal, technical editor, checked the technical content for accuracy. He also provided invaluable feedback on how to make the technical concepts more understandable.
—Ben Piper
Ben Piper has authored multiple books, including the AWS Certified Solutions Architect Study Guide: Associate SAA-C02 Exam (Sybex, 2020) and AWS Certified Cloud Practitioner Study Guide: Foundational CLF-C01 Exam (Sybex, 2019). You can contact Ben by visiting his website https://benpiper.com
Kunal Mittal is an entrepreneur and serves on the board of directors/advisers for multiple technology startups. His strengths are product strategy, technology strategy, and execution. His passion is building high-performing teams with a passion and gumption to innovate. Apart from technology, Kunal owns a winery in Paso Robles (central California) named LXV Wine, which won an award for being the 7th best Tasting Experience in the United States by USA Today.
Welcome to the exciting world of cloud computing and CompTIA certifications! If you picked up this book because you want to improve yourself with a secure and rewarding job in the new and fast-growing cloud computing space, you have come to the right place. Whether you are striving to enter the thriving, dynamic IT sector, or you are seeking to enhance your skills in the emerging cloud computing field, being CompTIA Cloud+ certified can seriously stack the odds of success in your favor.
CompTIA certifications are powerful instruments of success that will most certainly improve your knowledge of cloud computing. As you progress throughout this book, you'll gain a broad and deep understanding of cloud computing operations that offers unprecedented exposure to this dynamic field. The knowledge and expertise that you will gain are essential for your success in all areas of the cloud computing field.
By deciding to become Cloud+ certified, you're proudly announcing to the world that you want to become an unrivaled cloud computing expert—a goal that this book will get you well on your way to achieving. Congratulations in advance on the beginning of your brilliant future!
For up-to-the-minute updates covering additions or modifications to the CompTIA certification exams, as well as additional study tools, videos, practice questions, and bonus material, be sure to visit the Sybex website and forum at www.sybex.com .
CompTIA has created the world's leading vendor-neutral family of certifications in the technology industry. CompTIA's certifications are recognized and respected worldwide for their quality and rigorous standards. They offer a broad range of certifications on a wide variety of technology topics. When you become Cloud+ certified, you have validated your skills and expertise in the implementation and ongoing support of cloud-based services. Becoming a CompTIA Cloud+ certified professional validates that you have the knowledge to be a successful cloud engineer.
The Cloud+ certification is recognized as one of the premier cloud certifications on the market today. Studying for and passing the Cloud+ exam gives engineers the set of skills to succeed in the fast-growing field of cloud computing.
Rest assured that when you pass the CompTIA Cloud+ exam, you're headed down a path to certain success!
This book, consisting of 10 chapters, follows the most recent version of the CompTIA Cloud+ exam, CV0-003. The exam blueprint is divided into five sections which are explained in sufficient detail to help you become a Cloud+ certified professional.
Chapter 1
: Introducing Cloud Computing Configurations and Deployments
The book starts out by investigating the most common cloud components, such as applications, compute, storage, and networking. Then it discusses how to determine the correct size and scale of the systems. You will gain a basic understanding of configurations found in the cloud and learn about production, quality assurance, and development of cloud systems.
Chapter 2
: Cloud Deployments
In this chapter, you'll learn about deploying services in the cloud and how to execute a deployment plan; the most common service models; and the various ways that clouds are delivered, such as public, private, and community. Common cloud terminology and storage are explained.
Next, the chapter delves into the technical background and you'll learn how to determine the needs and design of an effective cloud deployment. This includes what virtualization is, its benefits, and why it's a central technology in cloud computing. You'll learn about hypervisors and virtual machines, and how to migrate from your existing operations to the cloud.
Chapter 3
: Security in the Cloud
This chapter covers cloud security, starting with security policies, laws, and standards. You will then learn about specific security technologies, applications, and services.
Chapter 4
: Implementing Cloud Security
This chapter builds on your security knowledge by explaining how to implement secure storage, networks, and compute systems. Security tools, intrusion systems, encryption, tools, techniques, and services are introduced.
Chapter 5
: Maintaining Cloud Operations
This chapter focuses on keeping your cloud deployment current with the latest updates, and it discusses the processes to follow. Automation is introduced, and you will learn about the importance of cloud automation and orchestration systems. The chapter concludes with a discussion of backing up your data in the cloud.
Chapter 6
: Disaster Recovery, Business Continuity, and Ongoing Maintenance
We'll take a step back in this chapter and cover how to go about developing a disaster recovery plan and the common models available. You will learn the importance of business survivability during a severe outage and understand the issues concerning recovery. The chapter ends by describing how to perform ongoing maintenance in your cloud environment.
Chapter 7
: Cloud Management
You'll now delve deeply into the operations aspects of cloud computing. This chapter begins with a discussion of monitoring the cloud, and then it moves on to look at the allocation and provisioning of resources. Then you will learn about business requirements, application life cycles, and the impact they have on managing your cloud deployment. The chapter concludes with a discussion on the security of your cloud operations with accounts, automation, authentication, and automation models.
Chapter 8
: Cloud Management Baselines, Performance, and SLAs
This chapter explains how to determine what is considered normal cloud operations by creating and maintaining baseline measurements. Using these measurements, you can monitor your cloud fleet for deviations from the baseline and learn the steps to take when this occurs. Service level agreements and chargeback models are also explained in this chapter.
Chapter 9
: Troubleshooting
This chapter goes deeply into the technical aspects, identifying and correcting cloud technical issues. Troubleshooting of new and existing deployments is covered. You will learn about common problems found in the cloud that you will need to resolve. You will learn how to identify and resolve deviations from your baselines and what to do when breakdowns in the workflow occur. Be sure to pay close attention to this chapter!
Chapter 10
: Troubleshooting Networking and Security Issues and Understanding Methodologies
The final chapter continues investigating troubleshooting with a focus on tools and techniques. Common troubleshooting utilities found in Linux and Windows systems are presented, and you'll learn how to perform a structured troubleshooting approach.
Appendix A
: Answers to Review Questions
This appendix contains answers to the book's Review Questions.
Appendix B
: Answers to Written Labs
This appendix contains the answers to the book's Written Labs.
Wiley has put together some great online tools to help you pass the Cloud+ exam. The interactive online learning environment that accompanies the Cloud+ exam certification guide provides a test bank and study tools to help you prepare for the exam. By using these tools, you can dramatically increase your chances of passing the exam on your first try.
Sample Tests
Many sample tests are provided throughout this book and online, including the assessment test at the end of this Introduction and the Review Questions at the end of each chapter. In addition, there are two exclusive online practice exams with 50 questions each. Use these questions to test your knowledge of the study guide material. The online test bank runs on multiple devices.
Flashcards
The online text banks include 100 flashcards specifically written to hit you hard, so don't get discouraged if you don't ace your way through them at first! They're there to ensure that you're ready for the exam. Armed with the Review Questions, Practice Exams, and Flashcards, you'll be more than prepared when exam day comes. Questions are provided in digital flashcard format (a question followed by a single correct answer). You can use the Flashcards to reinforce your learning and provide last-minute test prep before the exam.
Other Study Tools
A glossary of key terms from this book and their definitions is available as a fully searchable PDF.
Go to www.wiley.com/go/sybextestprep to register and gain access to this interactive online learning environment and test bank with study tools.
If you want a solid foundation for the serious effort of preparing for the CompTIA CV0-003 Cloud+ exam, then look no further. Hundreds of hours have been spent putting together this book with the sole intention of helping you to pass the exam as well as to learn about the exciting field of cloud computing! The book has been completely updated and refreshed from the original to match the new version of the CompTIA Cloud+ exam, CV0-003.
This book is loaded with valuable information, and you will get the most out of your study time if you understand why the book is organized the way it is. In order to maximize your benefit from this book, I recommend the following study method:
Take the assessment test that's provided at the end of this Introduction. (The answers are at the end of the test.) It's okay if you don't know any of the answers; that's why you bought this book! Carefully read over the explanations for any questions that you get wrong and note the chapters in which the material relevant to them is covered. This information should help you plan your study strategy.
Study each chapter carefully, making sure that you fully understand the information and the test objectives listed at the beginning of each one. Pay extra-close attention to any chapter that includes material covered in questions that you missed.
Complete all written labs in each chapter, referring to the text of the chapter so that you understand the reason for each answer.
Answer all the Review Questions related to each chapter. Many of the questions are presented in a scenario format to emulate real-world tasks that you may encounter. (The answers to the Review Questions appear in
Appendix A
.) Note the questions that confuse you and study the topics they cover again until the concepts are crystal clear. Again, do not just skim these questions. Make sure that you fully comprehend the reason for each correct answer. Remember that these will not be the exact questions you will find on the exam, but they're written to help you understand the chapter material and ultimately pass the exam.
Each chapter also concludes with a fill-in-the-blank type of written lab that is designed to improve your memory and comprehension of key items that were presented in the chapter. These labs are great for test preparation. I suggest going over the questions until you are consistently able to answer them error free. (The answers appear in
Appendix B
.)
Try your hand at the practice questions that are exclusive to this book. The questions can be found at
http://www.wiley.com/go/sybextestprep
.
Test yourself using all of the Flashcards, which are also found at
http://www.wiley.com/go/sybextestprep
. These are new Flashcards to help you prepare for the CV0-003 Cloud+ exam.
To learn every bit of the material covered in this book, you'll have to apply yourself regularly and with discipline. Try to set aside the same time period every day to study and select a comfortable and quiet place to do so. I am confident that if you work hard, you'll be surprised at how quickly you learn this material.
If you follow these steps and study in addition to using the Review Questions, the Practice Exams, and the electronic Flashcards, it would actually be hard to fail the Cloud+ exam. But understand that studying for the CompTIA exams is a lot like getting in shape—if you do not exercise most days, it's not going to happen!
According to the CompTIA website, the Cloud+ exam details are as follows:
Exam code:
CV0-003
Exam description:
CompTIA Cloud+ covers competency in cloud models, virtualization, infrastructure, security, resource management, and business continuity.
Number of questions:
Minimum of 90
Type of questions:
Multiple choice and performance-based
Length of test:
90 minutes
Passing score:
750 (on a scale of 100–900)
Language:
English
Recommended experience:
At least 2–3 years of work experience in IT systems administration or IT networking
CompTIA Network+ and Server+ or equivalent knowledge
Familiarity with any major hypervisor technology for server virtualization
Knowledge of cloud service models
Knowledge of IT service management
Hands-on experience with at least one public or private cloud IaaS platform
When the time comes to schedule your exam, you will need to create an account at www.comptia.org and register for your exam.
You can purchase the exam voucher on the CompTIA website at https://certification.comptia.org/testing/buy-voucher . The voucher is a proof of purchase and a code number that you will use to schedule the exam at https://www.comptia.org/testing/testing-options/about-testing-options .
When you have a voucher and have selected a testing center, you can go ahead and schedule the Cloud+ CV0-003 exam by visiting www.pearsonvue.com/comptia . There you can also locate a testing center or purchase vouchers if you have not already done so.
When you have registered for the Cloud+ certification exam, you will receive a confirmation email that supplies you with all the information you will need to take the exam.
This section explains CompTIA's exam policies and was taken from the CompTIA website. I recommend that you visit https://certification.comptia.org/testing/test-policies to become familiar with CompTIA's policies.
Candidate Agreement
Explains the rules and regulations regarding certification, including the retake policy, the candidate conduct policy, and the candidate appeals process.
Candidate Testing Policies
Includes accommodations during an exam, exam scoring, exam content, and out-of-country testing policies.
CompTIA Voucher Terms & Conditions
Details the terms and conditions governing CompTIA vouchers.
Candidate ID Policy
Details the acceptable forms of identification that candidates may bring to an exam.
Certification Retake Policy
Details the circumstances in which a candidate can retake a certification exam.
Exam Delivery Policies
Includes testing center suspensions, delivery exclusions, and beta testing policies.
Continuing Education Policies
Covers certification renewal, candidate code of ethics, and audit findings as related to the Continuing Education Program.
Exam Development
Explains the exam development process.
Sharing Your Exam Results
Explains the exam results sharing policy.
Unauthorized Training Materials
Defines unauthorized training materials and the consequences for using them.
Candidate Appeals Process
Describes the process for candidates to appeal sanctions imposed due to exam security or policy violations.
CompTIA Exam Security Hotline
Can be used to report security breaches, candidate misconduct, IP infringement, use of unauthorized training materials, and other exam security-related concerns.
The CompTIA Cloud+ exam contains at least 90 multiple-choice questions and must be completed in 90 minutes or less. This information may change over time, so check www.comptia.org for the latest updates.
Many questions on the exam offer answer choices that at first glance look identical, especially the syntax questions. Remember to read through the choices carefully because close just doesn't cut it. If you get information in the wrong order or forget one measly character, you may get the question wrong. Many of the questions will be presented as a long, involved statement that is designed to confuse or misdirect you. Read these questions carefully, and make sure that you completely understand what the question is asking. It's important to filter out irrelevant statements and focus on what they are asking you to identify as the correct answer. So, to practice, do the Practice Exams and hands-on exercises from this book's chapters over and over again until they feel natural to you. Do the online sample test until you can consistently answer all the questions correctly. Relax and read the question over and over until you are 100 percent clear on what it's asking. Then you can usually eliminate a few of the obviously wrong answers.
Here are some general tips for exam success:
Arrive early at the exam center so that you can relax and review your study materials.
Read the questions carefully. Don't jump to conclusions. Make sure that you're clear about exactly what each question asks. “Read twice, answer once!” Scenario questions can be long and contain information that is not relevant to the answer. Take your time and understand what they are really asking you.
Ask for a piece of paper and pencil if it's offered to take quick notes and make sketches during the exam.
When answering multiple-choice questions that you're unsure about, use the process of elimination to get rid of the obviously incorrect answers first. Doing this greatly improves your odds if you need to make an educated guess.
After you complete an exam, you'll get immediate, online notification of your pass or fail status, a printed examination score report that indicates your pass or fail status, and your exam results by section. (The test administrator will give you the printed score report.) Test scores are automatically forwarded to CompTIA after you take the test, so you don't need to send your score to them. If you pass the exam, you'll receive confirmation from CompTIA that you are now a Cloud+ certified professional!
The Cloud+ certification is good for three years from the date of the exam. You can keep your certification up-to-date by following CompTIA's continuing education program outlined at https://certification.comptia.org/continuing-education .
The following objective map will assist you with finding where each exam objective is covered in the chapters in this book.
Exam Objective
Chapters
1.1 Compare and contrast the different types of cloud models.
Deployment models
Public
Private
Hybrid
Community
Cloud within a cloud
Multicloud
Multitenancy
Service models
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
Advanced cloud services
Internet of Things (IoT)
Serverless
Machine learning/Artificial intelligence (AI)
Shared responsibility model
1
,
2
1.2 Explain the factors that contribute to capacity planning.
Requirements
Hardware
Software
Budgetary
Business needs analysis
Standard templates
Licensing
Per-user
Socket-based
Volume-based
Core-based
Subscription
User density
System load
Trend analysis
Baselines
Patterns
Anomalies
Performance capacity planning
2
,
8
,
9
1.3 Explain the importance of high availability and scaling in cloud environments.
Hypervisors
Affinity
Anti-affinity
Oversubscription
Compute
Network
Storage
Regions and zones
Applications
Containers
Clusters
High availability of network functions
Switches
Routers
Load balancers
Firewalls
Avoid single points of failure
Scalability
Auto-scaling
Horizontal scaling
Vertical scaling
Cloud bursting
1
,
2
,
5
,
7
1.4 Given a scenario, analyze the solution design in support of the business requirements.
Requirement analysis
Software
Hardware
Integration
Budgetary
Compliance
Service-level agreement (SLA)
User and business needs
Security
Network requirements
Sizing
Subnetting
Routing
Environments
Development
Quality assurance (QA)
Staging
Blue-green
Production
Disaster recovery (DR)
Testing techniques
Vulnerability testing
Penetration testing
Performance testing
Regression testing
Functional testing
Usability testing
1
,
2
,
5
,
8
Exam Objective
Chapters
2.1 Given a scenario, configure identity and access management.
Identification and authorization
Privileged access management
Logical access management
Account life-cycle management
Provision and deprovision accounts
Access controls
Role-based
Discretionary
Non-discretionary
Mandatory
Directory services
Lightweight directory access protocol (LDAP)
Federation
Certificate management
Multifactor authentication (MFA)
Single sign-on (SSO)
Security assertion markup language (SAML)
Public key infrastructure (PKI)
Secret management
Key management
2
,
3
,
4
2.2 Given a scenario, secure a network in a cloud environment
Network segmentation
Virtual LAN (VLAN)/Virtual extensible LAN (VXLAN)/Generic network virtualization encapsulation (GENEVE)
Micro-segmentation
Tiering
Protocols
Domain name service (DNS)
DNS over HTTPS (DoH)
DNS over TLS (DoT)
DNS security (DNSSEC)
Network time protocol (NTP)
Network time security (NTS)
Encryption
IPSec
Transport layer security (TLS)
Hypertext transfer protocol secure (HTTPS)
Tunneling
Secure Shell (SSH)
Layer 2 tunneling protocol (L2TP)/Point-to-point tunneling protocol (PPTP)
Generic routing encapsulation (GRE)
Network services
Firewalls
Stateful
Stateless
Web application firewall (WAF)
Application delivery controller (ADC)
Intrusion protection system (IPS)/Intrusion detection system (IDS)
Data loss prevention (DLP)
Network access control (NAC)
Packet brokers
Log and event monitoring
Network flows
Hardening and configuration changes
Disabling unnecessary ports and services
Disabling weak protocols and ciphers
Firmware upgrades
Control ingress and egress traffic
Whitelisting or blacklisting
Proxy servers
Distributed denial of service (DDoS) protection
2
,
3
2.3 Given a scenario, apply the appropriate OS and application security controls.
Policies
Password complexity
Account lockout
Application whitelisting
Software feature
User/group
User permissions
Antivirus/anti-malware/endpoint detection and response (EDR)
Host-based IDS (HIDS)/Host-based IPS (HIPS)
Hardened baselines
Single function
File integrity
Log and event monitoring
Configuration management
Builds
Stable
Long-term support (LTS)
Beta
Canary
Operating system (OS) upgrades
Encryption
Application programming interface (API) endpoint
Application
OS
Storage
Filesystem
Mandatory access control
Software firewall
2
,
3
,
4
,
5
,
7
2.4 Given a scenario, apply data security and compliance controls in cloud environments.
Encryption
Integrity
Hashing algorithms
Digital signatures
File integrity monitoring (FIM)
Classification
Segmentation
Access control
Impact of laws and regulations
Legal hold
Records management
Versioning
Retention
Destruction
Write once read many
Data loss prevention (DLP)
Cloud access security broker (CASB)
3
,
4
,
5
2.5 Given a scenario, implement measures to meet security requirements.
Tools
Vulnerability scanners
Port scanners
Vulnerability assessment
Default and common credential scans
Credentialed scans
Network-based scans
Agent-based scans
Service availabilities
Security patches
Hot fixes
Scheduled updates
Virtual patches
Signature updates
Rollups
Risk register
Prioritization of patch application
Deactivate default accounts
Impacts of security tools on systems and services
Effects of cloud service models on security implementation
3
2.6 Explain the importance of incident response procedures.
Preparation
Documentation
Call trees
Training
Tabletops
Documented incident types/categories
Roles and responsibilities
Incident response procedures
Identification
Scope
Investigation
Containment, eradication, and recovery
Isolation
Evidence acquisition
Chain of custody
Post-incident and lessons learned
Root cause analysis
9
Exam Objective
Chapters
3.1 Given a scenario, integrate components into a cloud solution.
Subscription services
File subscriptions
Communications
Voice over IP (VoIP)
Messaging
Collaboration
Virtual desktop infrastructure (VDI)
Directory and identity services
Cloud resources
IaaS
PaaS
SaaS
Provisioning resources
Compute
Storage
Network
Application
Serverless
Deploying virtual machines (VMs) and custom images
Templates
OS templates
Solution templates
Identity management
Containers
Configure variables
Configure secrets
Persistent storage
Auto-scaling
Post-deployment validation
1
,
2
,
7
,
8
3.2 Given a scenario, provision storage in cloud environments.
Types
Block
Storage area network (SAN)
Zoning
File
Network attached storage (NAS)
Object
Tenants
Buckets
Tiers
Flash
Hybrid
Spinning disks
Long-term
Input/output operations per second (IOPS) and read/write
Protocols
Network file system (NFS)
Common Internet file system (CIFS)
Internet small computer system interface (iSCSI)
Fibre Channel (FC)
Non-volatile memory express over fabrics (NVMe-oF)
Redundant array of inexpensive disks (RAID)
0
1
5
6
10
Storage system features
Compression
Deduplication
Thin provisioning
Thick provisioning
Replication
User quotas
Hyperconverged
Software-defined storage (SDS)
2
3.3 Given a scenario, deploy cloud networking solutions.
Services
Dynamic host configuration protocol (DHCP)
NTP
DNS
Content delivery network (CDN)
IP address management (IPAM)
2
Virtual private networks (VPNs)
Site-to-site
Point-to-point
Point-to-site
IPSec
Multiprotocol label switching (MPLS)
Virtual routing
Dynamic and static routing
Virtual network interface controller (vNIC)
Subnetting
Network appliances
Load balancers
Firewalls
Virtual private cloud (VPC)
Hub and spoke
Peering
VLAN/VXLAN/GENEVE
Single root input/output virtualization (SR-IOV)
Software-defined network (SDN)
2
3.4 Given a scenario, configure the appropriate compute sizing for a deployment.
Virtualization
Hypervisors
Type 1
Type 2
Simultaneous multi-threading (SMT)
Dynamic allocations
Oversubscription
Central processing unit (CPU)/virtual CPU (vCPU)
Graphics processing unit (GPU)
Virtual
Shared
Pass-through
Clock speed/Instructions per cycle (IPC)
Hyperconverged
Memory
Dynamic allocation
Ballooning
2
3.5 Given a scenario, perform cloud migrations.
Physical to virtual (P2V)
Virtual to virtual (V2V)
Cloud-to-cloud migrations
Vendor lock-in
PaaS or SaaS migrations
Access control lists (ACLs)
Firewalls
Storage migrations
Block
File
Object
Database migrations
Cross-service migrations
Relational
Non-relational
2
Exam Objective
Chapters
4.1 Given a scenario, configure logging, monitoring, and alerting to maintain operational status.
Logging
Collectors
Simple network management protocol (SNMP)
Syslog
Analysis
Severity categorization
Audits
Types
Access/authentication
System
Application
Automation
Trending
Monitoring
Baselines
Thresholds
Tagging
Log scrubbing
Performance monitoring
Application
Infrastructure components
Resource utilization
Availability
SLA-defined uptime requirements
Verification of continuous monitoring activities
Service management tool integration
Alerting
Common messaging methods
Enable/disable alerts
Maintenance mode
Appropriate responses
Policies for categorizing and communicating alerts
1
,
7
,
8
4.2 Given a scenario, maintain efficient operation of a cloud environment.
Confirm completion of backups
Life-cycle management
Roadmaps
Old/current/new versions
Upgrading and migrating systems
Deprecations or end of life
Change management
Asset management
Configuration management database (CMDB)
Patching
Features or enhancements
Fixes for broken or critical infrastructure or applications
Scope of cloud elements to be patched
Hypervisors
VMs
Virtual appliances
Networking components
Applications
Storage components
Firmware
Software
OS
Policies
n-1
Rollbacks
Impacts of process improvements on systems
Upgrade methods
Rolling upgrades
Blue-green
Canary
Active-passive
Development/QA/production/DR
Dashboard and reporting
Tagging
Costs
Chargebacks
Showbacks
Elasticity usage
Connectivity
Latency
Capacity
Incidents
Health
Overall utilization
Availability
4
,
5
,
7
,
8
4.3 Given a scenario, optimize cloud environments.
Right-sizing
Auto-scaling
Horizontal scaling
Vertical scaling
Cloud bursting
Compute
CPUs
GPUs
Memory
Containers
Storage
Tiers
Adaptive optimization
IOPS
Capacity
Deduplication
Compression
Network
Bandwidth
Network interface controllers (NICs)
Latency
SDN
Edge computing
CDN
Placement
Geographical
Cluster placement
Redundancy
Colocation
Device drivers and firmware
Generic
Vendor
Open source
1
,
2
,
7
,
8
4.4 Given a scenario, apply proper automation and orchestration techniques.
Infrastructure as code
Infrastructure components and their integration
Continuous integration/ continuous deployment (CI/CD)
Version control
Configuration management
Playbook
Containers
Automation activities
Routine operations
Updates
Scaling
Shutdowns
Restarts
Create internal APIs
Secure scripting
No hardcoded passwords
Use of individual service accounts
Password vaults
Key-based authentication
Orchestration sequencing
1
,
2
,
4
,
5
,
7
4.5 Given a scenario, perform appropriate backup and restore operations.
Backup types
Incremental
Differential
Full
Synthetic full
Snapshot
Backup objects
Application-level backup
Filesystem backup
Database dumps
Configuration files
Backup targets
Tape
Disk
Object
Backup and restore policies
Retention
Schedules
Location
SLAs
Recovery time objective (RTO)
Recovery point objective (RPO)
Mean time to recovery (MTTR)
3-2-1 rule
Three copies of data
Two different media
One copy off site
Restoration methods
In place
Alternate location
Restore files
Snapshot
5
4.6 Given a scenario, perform disaster recovery tasks.
Failovers
Failback
Restore backups
Replication
Network configurations
On-premises and cloud sites
Hot
Warm
Cold
Requirements
RPO
RTO
SLA
Corporate guidelines
Documentation
DR kit
Playbook
Network diagram
Geographical datacenter requirements
6
Exam Objective
Chapters
5.1 Given a scenario, use the troubleshooting methodology to resolve cloud-related issues.
Always consider corporate policies, procedures, and impacts before implementing changes.
10
Identify the problem
Question the user and identify user changes to the computer and perform backups before making changes
Inquire regarding environmental or infrastructure changes
Establish a theory of probable cause (question the obvious)
If necessary, conduct external or internal research based on symptoms
Test the theory to determine cause
Once the theory is confirmed, determine the next steps to resolve the problem
If the theory is not confirmed, re-establish a new theory or escalate
Establish a plan of action to resolve the problem and implement the solution
Verify full system functionality and, if applicable, implement preventive measures
Document the findings, actions, and outcomes throughout the process.
5.2 Given a scenario, troubleshoot security issues.
Privilege
Missing
Incomplete
Escalation
Keys
Authentication
Authorization
Security groups
Network security groups
Directory security groups
Keys and certificates
Expired
Revoked
Trust
Compromised
Misconfigured
Misconfigured or misapplied policies
Data security issues
Unencrypted data
Data breaches
Misclassification
Lack of encryption in protocols
Insecure ciphers
Exposed endpoints
Misconfigured or failed
security appliances
IPS
IDS
NAC
WAF
Unsupported protocols
External/internal attacks
10
5.3 Given a scenario, troubleshoot deployment issues.
Connectivity issues
Cloud service provider (CSP) or Internet service provider (ISP) outages
Performance degradation
Latency
Configurations
Scripts
Applications in containers
Misconfigured templates
Missing or incorrect tags
Insufficient capacity
Scaling configurations
Compute
Storage
Bandwidth issues
Oversubscription
Licensing issues
Vendor-related issues
Migrations of vendors or platforms
Integration of vendors or platforms
API request limits
Cost or billing issues
9
5.4 Given a scenario, troubleshoot connectivity issues.
Network security group misconfigurations
ACL
Inheritance
Common networking configuration issues
Peering
Incorrect subnet
Incorrect IP address
Incorrect IP space
Routes
Default
Static
Dynamic
Firewall
Incorrectly administered micro-segmentation
Network address translation (NAT)
VPN
Source
Destination
Load balancers
Methods
Headers
Protocols
Encryption
Back ends
Front ends
DNS records
VLAN/VXLAN/GENEVE
Proxy
Maximum transmission unit (MTU)
Quality of service (QoS)
Time synchronization issues
Network troubleshooting tools
ping
tracert/traceroute
flushdns
ipconfig/ifconfig/ip
nslookup/dig
netstat/ss
route
arp
curl
Packet capture
Packet analyzer
OpenSSL client
10
5.5 Given a scenario, troubleshoot common performance issues.
Resource utilization
CPU
GPU
Memory
Storage
I/O
Capacity
Network bandwidth
Network latency
Replication
Scaling
Application
Memory management
Service overload
Incorrectly configured or failed load balancing
9
5.6 Given a scenario, troubleshoot automation or orchestration issues.
Account mismatches
Change management failures
Server name changes
IP address changes
Location changes
Version/feature mismatch
Automation tool incompatibility
Deprecated features
API version incompatibility
Job validation issue
Patching failure
9
If you believe you've found a mistake in this book, please bring it to our attention. At John Wiley & Sons, we understand how important it is to provide our customers with accurate content, but even with our best efforts an error may occur.
To submit your possible errata, please email it to our Customer Service Team at [email protected] with the subject line “Possible Book Errata Submission.”
Bob is accessing a self-service portal in the cloud to instantly create additional servers, storage, and database instances for his firm's DevOps group. Which of the following options best describes this operation?
Bursting
Pay-as-you-grow
Multitenancy
On-demand
Jillian is working on a project to interconnect her company's private data center to a cloud company that offers email services and another that can provide burstable compute capacity. What type of cloud delivery model is she creating?
Public
Hybrid
Community
Private
Carl is learning how cloud service providers allocate physical resources into a group. These resources are then dynamically associated with cloud services as demand requires. What best describes this?
On-demand virtualization
Dynamic scaling
Resource pooling
Elasticity
Liza is a new Cloud+ architect for BigCo Inc. She is investigating cloud services that provide server hardware, but not applications. What cloud service is she using?
IaaS
PaaS
SaaS
CaaS
Harold is investigating his options to migrate his company's time and attendance application to the cloud. He wants to be responsible only for maintaining the application and would prefer that the public cloud company manage all underlying infrastructure and servers that are required to support his application. Harold calls you and asks for assistance in selecting a cloud service model that would meet his requirements. What would you suggest that he implement?
IaaS
PaaS
SaaS
CaaS
Jane is a Cloud+ architect working on a physical-to-virtual migration to the public cloud. She has matched VM performance levels to her established baselines. She knows that her organization may need to adjust hardware resources in the future. What cloud characteristics can she use to match cloud capacity with future growth? (Choose three.)
Elasticity
On-demand computing
Availability zones
Resiliency virtualization
Pay-as-you grow
Resource pooling
What are two elements that together distinguish the cloud from a traditional data center operation? (Choose two.)
Load balancing
Automation
Autoscaling groups
Virtualization
Dawn is interested in selecting a community cloud provider that offers a specialized financial reporting application. What type of cloud model would you recommend Dawn investigate to meet her requirements?
IaaS
PaaS
SaaS
CaaS
Carol is a cloud customer that your consulting company is assisting with their migration. She is asking you about the demarcation point of operations for her public PaaS service. Which of the following defines what you are responsible for and the responsibility of the provider?
Availability zones
Community
Shared responsibility model
Baselines
Jonathan is architecting his client's global public cloud presence for an upcoming e-commerce deployment. You have been brought on to help design the network. He asks about providing local connections in Singapore and Malaysia. What would you suggest that he investigate?
Regions
Auto-scaling groups
Availability zones
Global DNS affinity
Zale is working on a collaborative project that requires the implementation of a large-scale NoSQL database that will access three petabytes of historical data. He needs durable block storage in remote flash arrays. You have been tasked with designing the storage connectivity from the database to the stored data. What type of network connection would you recommend for NoSQL read/write access to the arrays?
Block access
Zoning
VMFS
SAN
Physical resources are virtualized and presented as resources to virtual machines running on hypervisors. What common resources does the hypervisor virtualize? (Choose three.)
Layer 2
RAM
Layer 3
CPUs
RAID
Storage
As a new Cloud+ professional, you have been hired by a company that operates its own data center; however, the company is calling it a cloud. What delivery model are you working with?
Hybrid
Public
Private
Community
Tim just logged into his cloud management dashboard to check the health monitors of his server fleet. What is the process that he completed at login?
Authorization
Accounting
Authentication
Federation
Identity access
Martha is studying SAN technologies that use the Fibre Channel protocol, and she is asking about disk configuration in the remote storage array. She asks you which type of storage she can use on her Linux servers. What storage type can she deploy? (Choose the best answer.)
Meta
Object
Block
File
Patesh is becoming familiar with the interfaces available for his operations team to use to access his hybrid cloud deployment. You have been asked to explain the common types of user-based interfaces available to manage cloud objects. What are the common interfaces that you would explain to Patesh? (Choose three.)
Web console
SNMP
API
PaaS
CLI
You work for a company that offers cloud services to the railroad industry. All railroads have a similar set of requirements and access the same applications. BigWest Rail has contacted you about becoming a customer and is asking what applications are shared with other rail operators. They also ask what type of cloud model your company offers. What type of cloud is this?
Hybrid
Public
Private
Community
Kevin is exploring a durable block storage option that offers high performance. It also needs to support striping that allows a parity bit to be used to reconstruct a volume if a single magnetic disk fails in his array. Which storage type stripes file data and performs a parity check of data over multiple disks that can recover from a single hard disk failure?
RAID 0
RAID 1
RAID 3
RAID 5
You are involved in a large-scale migration project that requires moving a Windows OS running on a dual-slot, eight-core server with no hypervisor in a data center to a virtual server in the public cloud. What type of migration is this?
vMotion
P2V
Private to public
V2V
Synchronous replication
You have been asked by a new customer what type of authentication systems require something that you have and something that you know. What type of authentication technology would you recommend?
Single sign-on
Confederations
Active Directory/LDAP
Multifactor
Beatriz stops at her bank's ATM on her way home from work. She inserts her card into the ATM and then enters her PIN on the keypad. What type of authentication is she using?
SSO
Two-factor
LDAP
User-based
Roman is the cloud administrator for a company that stores object-based data in a hybrid cloud. Because of the sensitivity of the data and various regulatory restrictions on allowing users access to sensitive security data, what type of access control would meet his security policies?
Mandatory access control
Nondiscretionary
Roles
Multifactor
William is implementing an access control rollout for a cluster of Windows SQL database servers in a hybrid cloud environment. Developers will need full read/write access to the database servers, whereas other business units will need read-only access to particular databases. What type of access control should William deploy?
Mandatory access control
Nondiscretionary
Role-based
Multifactor
Quentin is a defense contractor investigating server compliance requirements needed to be certified to meet the U.S. Department of Defense security requirements for contractors. What requirement would you recommend that he focus on?
FedRAMP
DIACAP
FISMA
Section 405.13 for DoD rule A286
Leanna wants to deploy a public cloud service that allows her to retain responsibility only for her applications and requires the cloud provider to maintain the underlying operating system and virtualized hardware. Which service model would you recommend that she implement?
IaaS
PaaS
SaaS
CaaS
Robert is configuring a new cloud interconnect to access his locally hosted Active Directory services. He wants to prevent his user base from having fragmented rights and no unified authorization services. You are brought in as a service consultant to assist in optimizing and controlling user access by implementing a technology that will give access to all allowed systems at the time of user authentication. What type of system are you deploying?
Token-based 2FA
SSO
RSA
Nondiscretionary
Cathy is preparing her company's migration plan from a private to a hybrid cloud. She wants to outline firewall and DDoS requirements. What document should she create?
DIACAP
Security policy
Service level agreement
SOC-2
Perry is investigating options for interconnecting a private cloud to a new public cloud region that supports analysis of customer-streamed IoT data. He is planning on implementing a tunnel across the Internet to interconnect the two locations to avoid the high costs of a dedicated interconnection. What transport protocol would you suggest that can offer a secure connection across the unsecure Internet?
AES
SOC-3
IPsec
RC5
Jarleen is a consultant tasked with migrating Health Med Records Inc. customer records to a cloud-based service offering a long-term archival system. Which U.S. compliance mandate must her company align with?
SOC 3
HIPAA
MPAA
ISA 2701
Fluentes is a security consultant for a day trading company that must implement strong encryption of data at rest for their cloud storage tiers. What is the best option that meets most security regulations for the encryption of stored data?
3DES
RSA
AES-256
Rivest Cipher 5
Randy is developing a new application that will be deployed in an IaaS-based public cloud. He builds a test image and deploys a test VM in his private cloud's development zone. When he stops and restarts one of the Linux-based servers, he notices that his storage volume data is missing. What type of storage exhibits this behavior? (Choose two.)
Durable
RAID
Ephemeral
Nondurable
Block
Object
Matt has finished running some security automation scripts on three newly deployed Linux servers. After applying intrusion detection, virus, and malware protection on the Linux images, he notices an increase in which VM metric on his server management dashboard?
DMA
BIOS
CPU
IPsec
I/O
Jill works in the operations center, and she is tasked with monitoring security operations. What cloud-based GUI can she use for a real-time overview of security operations?
Puppet automation
Gemalto system
Dashboard
Vendor-based security appliance
Larken is reviewing the SLA and statement of responsibility with his community cloud provider PaaS. To whom does the responsibility for stored data integrity in the cloud belong?
Cloud provider
Compliance agency
Cloud customer
Shared responsibility
Mindy has been tasked with developing a new QA test logging application, but she is concerned that the application must pull data from many different cloud locations and devices. What is a good interface for her to use to meet her requirements?
Python
XML
API
SNMP
TLS
What technology was instrumental in the growth of cloud services?
XML
Python
Automation
Authentication
Security
Workflow services
Encryption
Vicky is investigating multiple hacking attempts on her cloud-based e-commerce web servers. She wants to add a front-end security system that can actively deploy countermeasures that shut down the hacking attempts. What application would you suggest that Vicky deploy?
DMZ
IDS
IPS
RAID
HIDS
What options can you offer your user base for MFA tokens? (Choose two.)
One-time password
Smartphone app
Automation systems
Key fob
Cloud vendor management dashboard
Linda works in the IT security group of her firm and has been tasked with investigating options that will allow customers to access their personal records securely via the web. What is the most common in-flight e-commerce security protocol on the market?
MD5
SSL/TLS
IPsec
VPN
Your company has purchased a specialized intrusion prevention system that is virtualized and designed for cloud-based network micro-segmentation deployments. When reading the documentation, you notice a link to download a Java-based application to monitor and configure the IPS application. What kind of configuration program is this?
CLI
GIU
Vendor-based
API
RESTful
Name the type of software update that is designed to address a known bug and to bring a system up-to-date with previously released fixes.
Hotfix
Patch
Version update
Rollout
Your employer has developed a mission-critical application for the medical industry, and there can be no downtime during maintenance. You have designed a web architecture to take this into account and that allows you to have an exact copy of your production fleet that can be brought online to replace your existing deployment for patching and maintenance. What type of model did you implement?
Cluster
DevOps
Blue-green
Rolling
Jill is performing a Tuesday night backup of a Tier 2 storage volume of which she already completed a full backup on Sunday night. She only wants to back up files based on changes of the source data since the last backup. What type of backup is she performing?
Full
Differential
Incremental
Online
What virtual machine backup method creates a file-based image of the current state of a VM, including the complete operating system and all applications that are stored on it?
Full backup
Snapshot
Clone
Replicate
Ronald is a Cloud+ student studying systems that abstract and hide much of the complexity of modern cloud systems. What is he learning about?
Runbooks
Workflow
Orchestration
REST/API
What are common automation platforms? (Choose three.)
Chef
Cloud-patch
Ansible
DevOps
Puppet
Cloud Deploy
Marlene is updating her horizontally scaled Internet-facing web servers to remediate a critical bug. Her manager has agreed to operate under reduced computing capacity during the process but stipulates that there can be no downtime. What upgrade approach should Marlene perform to meet these requirements?
Orchestration
Rolling
Hotfix
Blue-green
What VM backup method can be used to create a master image to be used as a template to create additional systems?
Full backup
Snapshot
Clone
Replica
A new application patch is being validated prior to release to the public. The developers have a release candidate, and the DevOps manager is requesting a report that shows the pass/fail data to verify that the fix does, in fact, resolve the problem. What process is the manager verifying?
Rollout
Orchestration
Automation
QA
Jane has found a table merge issue in her SQL database hosted in a private cloud. While reviewing the log files, the vendor requested that she install a software change designed for rapid deployment that corrects a specific and critical issue. What are they referring to?
Hotfix
Patch
Version update
Rollout
To meet regulatory requirements, a medical records company is required to store customer transaction records for seven years. The records will most likely never be accessed after the second year and can be stored offline to reduce expenses. What type of storage should they implement to achieve this goal?
File transfer
Archive
Replication
Data store
Mark is creating a disaster recovery plan based on directives from his company's executive management team. His company's business is an e-commerce website that sells children's apparel, with 85 percent of its revenue received during the holiday season. If there was a severe disruption in operations, the loss of business could put the company's ongoing financial viability in peril. Mark is creating a plan that will restore operations in the shortest amount of time possible if there is an outage. What DR model is he implementing?
Hot site
Active/active
Warm site
Active/passive
Cold site
Rollover