Muutke küpsiste eelistusi

E-raamat: CompTIA Cloud+ Certification All-in-One Exam Guide (Exam CV0-003)

  • Formaat: 640 pages
  • Ilmumisaeg: 30-Jul-2021
  • Kirjastus: McGraw-Hill Education
  • Keel: eng
  • ISBN-13: 9781264264865
Teised raamatud teemal:
  • Formaat - EPUB+DRM
  • Hind: 52,00 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 640 pages
  • Ilmumisaeg: 30-Jul-2021
  • Kirjastus: McGraw-Hill Education
  • Keel: eng
  • ISBN-13: 9781264264865
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

This self-study guide offers 100% coverage of every objective for the CompTIA Cloud+ Certification exam


Take the challenging CompTIA Cloud+ Certification exam (exam CV0-003) with confidence using the comprehensive information contained in this effective study resource. Written by an expert in the field, the book lays out the skills required of today’s system administrators and systems engineers—all while showing you how to pass the test. Beyond exam preparation, the guide also serves as a valuable on-the-job reference.

CompTIA Cloud+ Certification All-in-One Exam Guide (Exam CV0-003) is based on proven pedagogy and features special elements that teach and reinforce practical skills. The book contains accurate practice questions along with detailed explanations. You will get hands-on examples, case studies, and best practices drawn from the author’s experience.
  • Contains complete coverage of all official objectives for exam CV0-003
  • Online content includes 300 practice questions in the Total Tester exam engine
  • Written by a senior systems engineer and experienced author






Acknowledgments xix
Introduction xxi
Chapter 1 Cloud Computing Concepts, Models, and Terminology 1(28)
Cloud Service Models
1(6)
Infrastructure as a Service
2(1)
Platform as a Service
3(1)
Software as a Service
4(1)
Database as a Service
4(1)
Communications as a Service
5(1)
Business Process as a Service
5(1)
Anything as a Service
6(1)
Accountability and the Shared Responsibility Model
6(1)
Cloud Deployment Models and Services
7(4)
Private Cloud
7(1)
Public Cloud
8(1)
Hybrid Cloud
9(1)
Community Cloud
10(1)
Cloud Within a Cloud
10(1)
On-Premises vs. Off-Premises Hosting
10(1)
Orchestration Platforms
11(1)
Multicloud
11(1)
Cloud Characteristics and Terms
11(7)
Elasticity
12(1)
Demand-Driven Service
12(1)
Pay-as-You-Grow
12(1)
Chargeback
12(1)
Ubiquitous Access
13(1)
Metering
13(1)
Multitenancy
13(1)
Cloud Bursting
13(2)
Baselines
15(1)
Source and Target Hosts
16(1)
Existing Systems
16(1)
Cloud Elements
16(2)
Advanced Cloud Services
18(6)
Machine Learning and Artificial Intelligence
18(1)
Serverless
19(4)
Exercise 1-1: Creating a Basic Serverless Application on AWS Lambda
19(4)
Internet of Things
23(1)
Chapter Review
24(5)
Questions
24(3)
Answers
27(2)
Chapter 2 Disk Storage Systems 29(22)
Disk Types and Configurations
29(9)
Rotational Media
30(1)
Solid State Drive
30(3)
USB Drive
33(1)
Tape
33(1)
Interface Types
34(1)
Access Speed
34(1)
Redundant Array of Independent Disks (RAID)
35(2)
Write Once, Read Many (WORM)
37(1)
Tiering
38(2)
Performance Levels of Each Tier
38(2)
Policies
40(1)
File System Types
40(7)
Unix File System
40(1)
Extended File System
41(1)
File Allocation Table File System
41(1)
New Technology File System
42(3)
Exercise 2-1: Formatting a Disk with the NTFS Partition in Windows
42(3)
Resilient File System
45(1)
Virtual Machine File System
46(1)
Z File System
46(1)
Chapter Review
47(4)
Questions
47(3)
Answers
50(1)
Chapter 3 Storage Networking 51(30)
Storage Types and Technologies
51(10)
Direct Attached Storage
52(1)
Storage Area Network
52(2)
Network Attached Storage
54(1)
Object Storage
55(5)
Exercise 3-1: Creating Object Storage
57(3)
Deduplication Technologies
60(1)
Compression Technologies
60(1)
Data BLOB
61(1)
Storage Access Protocols
61(3)
Fibre Channel
61(1)
Fibre Channel Protocol
61(1)
Fibre Channel over Ethernet
62(1)
Ethernet
62(1)
TCP/IP
62(1)
Internet Fibre Channel Protocol
63(1)
Internet Small Computer System Interface
63(1)
Nonvolatile Memory Express Over Fabrics
64(1)
Storage Provisioning
64(7)
Performance
64(2)
Logical Unit Numbers
66(1)
Network Shares
67(1)
Zoning and LUN Masking
67(1)
Multipathing
68(1)
Provisioning Model
69(1)
Encryption Requirements
70(1)
Tokenization
71(1)
Storage Protection
71(4)
High Availability
72(1)
Storage Replication
72(3)
Chapter Review
75(6)
Questions
76(3)
Answers
79(2)
Chapter 4 Network Infrastructure 81(32)
Network Types
81(2)
Intranet
82(1)
Internet
82(1)
Extranet
83(1)
Network Optimization
83(10)
Network Scope
84(1)
Network Topologies
84(3)
Bandwidth and Latency
87(2)
Load Balancing
89(1)
Network Service Tiers
89(3)
Exercise 4-1: Configuring Network Service Tiers in Google Cloud
91(1)
Proxy Servers
92(1)
Content Delivery Network
93(1)
Routing and Switching
93(7)
Network Address Translation
94(2)
Port Address Translation
96(1)
Subnetting and Supernetting
96(1)
Routing Tables
97(1)
Network Segmentation and Micro-segmentation
97(3)
Network Ports and Protocols
100(8)
Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure
101(1)
File Transfer Protocol and FTP over SSL
101(2)
Secure Shell File Transfer Protocol
103(1)
Domain Name System
103(2)
Dynamic Host Configuration Protocol
105(1)
IP Address Management
106(1)
Simple Mail Transfer Protocol
106(1)
Network Time Protocol
106(1)
Well-Known Ports
107(1)
Chapter Review
108(5)
Questions
109(2)
Answers
111(2)
Chapter 5 Virtualization Components 113(44)
Hypervisor
114(3)
Type 1
114(1)
Type 2
115(1)
Proprietary
116(1)
Open Source
116(1)
Consumer vs. Enterprise
117(1)
Virtualization Host
117(4)
Hardware-Assisted Virtualization
118(1)
Single Root Input/Output Virtualization
119(1)
BIOS
119(1)
UEFI
120(1)
Firmware Configurations
120(1)
Hyperconverged Systems and Infrastructure
120(1)
VM Sizing Considerations
121(12)
CPU
121(4)
GPU
125(2)
Memory
127(3)
NIC
130(3)
Exercise 5-1: Creating a Virtual Switch in Hyper-V
131(2)
Virtual Machine
133(14)
Virtual Disks
134(1)
vNIC
135(2)
Virtual Switches
137(1)
Memory
137(2)
Storage Virtualization
139(1)
Guest Tools
140(7)
Exercise 5-2: Creating a Virtual Machine in Hyper-V
141(6)
Virtualized Infrastructure Service Elements
147(5)
DNS
148(1)
DHCP
148(1)
Certificate Services
149(1)
Local Agents
150(1)
Antivirus
150(1)
Load Balancing
150(1)
Multifactor Authentication
151(1)
Firewall
151(1)
IDS/IPS
151(1)
Chapter Review
152(5)
Questions
152(3)
Answers
155(2)
Chapter 6 Virtualization and the Cloud 157(34)
Benefits of Virtualization in a Cloud Environment
157(4)
Shared Resources
158(1)
Elasticity
158(1)
Network and Application Isolation
159(1)
Infrastructure Consolidation
160(1)
Virtual Data Center Creation
161(1)
\Virtual Resource Migrations
161(15)
Virtual Machine Templates
161(2)
Physical to Virtual
163(1)
Virtual to Virtual
164(1)
Virtual to Physical
165(1)
Physical to Physical
165(1)
Virtual Machine Cloning
166(1)
Virtual Machine Snapshots
166(1)
Clones vs. Snapshots
167(1)
Storage Migration
167(1)
Host Clustering and HA/DR
168(1)
Cloud Provider Migrations
169(7)
Exercise 6-1: Creating a Cloud Firewall on Azure
172(4)
Migration Considerations
176(8)
Requirements Gathering
176(1)
Migration Scheduling
177(1)
Upgrading
178(3)
Testing
181(1)
Databases
182(2)
Software Defined
184(2)
Software Defined Network
185(1)
Software Defined Storage
185(1)
Software Defined Data Center
185(1)
Chapter Review
186(5)
Questions
186(3)
Answers
189(2)
Chapter 7 Cloud Adoption 191(40)
Planning
191(16)
Requirement Analysis
192(2)
Designing a Solution
194(9)
Selection
203(1)
Deployment Plan
204(3)
Approval
207(1)
Implementation
207(15)
Service Model Solutions
208(2)
Solutions
210(2)
Deploying Virtual Systems
212(2)
Networking
214(6)
Exercise 7-1: Creating a Virtual Network in Azure
214(2)
Exercise 7-2: Creating a Default Route on Azure
216(4)
Containers
220(2)
Post-Deployment Validation
222(1)
Remote Access Tools
222(4)
Remote Hypervisor Access
223(1)
RDP
223(2)
Console Port
225(1)
SSH
225(1)
HTTP
226(1)
Chapter Review
226(5)
Questions
226(2)
Answers
228(3)
Chapter 8 DevOps 231(24)
Application Life Cycle
231(10)
Phase 1: Specifications
232(1)
Phase 2: Development
232(3)
Phase 3: Testing
235(1)
Phase 4: Deployment
236(2)
Phase 5: Maintenance
238(1)
Life Cycle Management
239(2)
Ending Applications
241(2)
Application Replacement
241(1)
Application Retirement
242(1)
Application Migration
243(1)
Application Feature Use (Increase/Decrease)
243(1)
Secure Coding
243(5)
Avoid Hardcoded Passwords
244(1)
Service Account Best Practices
244(1)
Password Vaults
245(1)
Key-Based Authentication
246(2)
Exercise 8-1: Setting Up SSH Keys for Key-Based Authentication
247(1)
DevOps Cloud Transformation
248(4)
Business Needs Change
248(2)
Continuous Integration/Continuous Delivery
250(1)
Infrastructure as Code
251(1)
Chapter Review
252(3)
Questions
252(2)
Answers
254(1)
Chapter 9 Performance Tuning 255(26)
Host Resource Allocation
255(3)
Compute Resources
255(1)
Quotas and Limits
256(1)
Licensing
257(1)
Reservations
257(1)
Resource Pools
258(1)
Guest Resource Allocation
258(4)
Compute Resources
258(1)
Quotas and Limits
259(1)
Licensing
259(1)
Physical Resource Redirection
260(1)
Resource Pools
261(1)
Dynamic Resource Allocation
261(1)
Optimizing Performance
262(12)
Configuration Best Practices
262(6)
Exercise 9-1: Setting CPU Affinity and Anti-Affinity Rules in VMWare Cloud
265(3)
Scalability
268(1)
Performance Concepts
268(3)
Performance Automation
271(3)
Common Performance Issues
274(3)
Common Disk Issues
274(2)
Common Memory Issues
276(1)
Network Issues
276(1)
Physical Processor Issues
277(1)
Chapter Review
277(4)
Questions
278(2)
Answers
280(1)
Chapter 10 Systems Management 281(58)
Policies and Procedures
281(6)
Standard Operating Procedures
282(1)
Workflow
282(1)
Capacity Management
283(1)
Records Management
284(3)
Systems Management Best Practices
287(8)
Documentation
287(2)
Standardization
289(1)
Metrics
290(1)
Dashboards
291(4)
Planning
295(1)
Systems Maintenance
295(22)
Code Updates
295(2)
Deployment Landscapes
297(2)
Deployment Methodologies
299(2)
Patch Management
301(12)
Exercise 10-1: Configuring Group Policy for Automatic Updates
304(9)
Component Updates
313(2)
Maintenance Automation
315(2)
Monitoring Techniques
317(15)
Collector Protocols and Methods
318(2)
Tagging
320(1)
Log Analysis
320(5)
Baselines
325(1)
Thresholds
326(1)
Trending
326(1)
Automated Event Responses
327(3)
Log Scrubbing
330(1)
Verification of Continuous Monitoring Activities
330(1)
Management Tools
331(1)
Chapter Review
332(7)
Questions
333(3)
Answers
336(3)
Chapter 11 Security in the Cloud 339(46)
Data Security
339(14)
Encryption
340(1)
Public Key Infrastructure
341(6)
Encryption Protocols
347(1)
Tunneling Protocols
347(2)
Ciphers
349(2)
Storage Security
351(1)
Protected Backups
352(1)
Network Security
353(7)
Segmentation
353(2)
Firewall
355(2)
DDoS Protection
357(1)
Packet Capture
358(1)
Network Flow
358(1)
IDS/IPS
358(1)
Packet Broker
359(1)
APIs
359(1)
Effects of Cloud Service Models on Security Implementation
359(1)
Endpoint Protection
360(11)
Host-Based Firewall
360(1)
Antivirus/Antimalware
361(1)
Endpoint Detection and Response
362(1)
Data Loss Prevention
362(6)
Exercise 11-1: Creating a DLP Policy for Office 365
362(6)
NAC
368(1)
Hardening
369(2)
Application Whitelisting
371(1)
Impact of Security Tools to Systems and Services
371(1)
Access Control
371(9)
Identification
372(1)
Authentication
372(1)
Authorization
372(2)
Single Sign-On
374(1)
Federation
374(1)
Access Control Protocols
375(2)
Access Control Methodologies
377(2)
Multifactor Authentication
379(1)
Chapter Review
380(5)
Questions
381(2)
Answers
383(2)
Chapter 12 Security Best Practices 385(48)
Cloud Security Engineering
386(5)
Implementing Layered Security
386(1)
Protecting Against Availability Attacks
387(1)
Least Privilege
387(1)
Separation of Duties
388(1)
Security Automation
388(3)
Security Governance and Strategy
391(15)
Developing Company Security Policies
391(2)
Account Management Policies
393(2)
Documenting Security Procedures
395(1)
Assessment and Auditing
395(2)
Leveraging Established Industry Standards and Regulations
397(3)
Applying Platform-Specific Security Standards
400(1)
Data Classification
400(1)
Legal Holds
401(4)
Exercise 12-1: Creating a Legal Hold for a Mailbox in Office 365
401(4)
Keeping Employees and Tools Up to Date
405(1)
Roles and Responsibilities
406(1)
Vulnerability Management
406(13)
Testing Methods
407(1)
Vulnerability Scanning
408(6)
Penetration Testing
414(3)
Roles and Responsibilities
417(1)
Considerations Before You Scan or Test
418(1)
Incident Response
419(10)
Preparation
419(6)
Incident Types
425(1)
Incident Response Procedures
426(3)
Chapter Review
429(4)
Questions
430(2)
Answers
432(1)
Chapter 13 Business Continuity and Disaster Recovery 433(44)
Business Continuity Methods
433(12)
Business Continuity Plan
434(1)
Contingency
434(2)
Resiliency
436(1)
High Availability
437(7)
Service-Level Agreements for BCP and HA
444(1)
Disaster Recovery Methods
445(8)
Corporate Guidelines/Documentation
445(6)
Replication
451(2)
File Transfer
453(1)
Service-Level Agreements for DR
453(1)
Backup and Recovery
453(19)
Backup Types
454(7)
Backup Target
461(7)
Exercise 13-1: Cross-Region Replication
461(7)
Other Backup Considerations
468(3)
Restoration Methods
471(1)
Archiving
472(1)
Chapter Review
472(5)
Questions
473(2)
Answers
475(2)
Chapter 14 Testing, Automation, and Changes 477(36)
Testing Techniques
478(17)
Baseline Comparisons
478(8)
Exercise 14-1: Collecting Windows Metrics with Performance Monitor
481(5)
Performance Testing
486(2)
Configuration Testing
488(2)
Testing in the Cloud Landscape
490(1)
Functional Testing
490(1)
Regression Testing
491(1)
Usability Testing
491(1)
SLA Comparisons
492(1)
Testing Sizing Changes
492(1)
Testing High Availability
493(1)
Testing Load Balancing
493(1)
Testing Connectivity
494(1)
Verifying Data Integrity
494(1)
Evaluating Replication
494(1)
Automation and Orchestration
495(5)
Event Orchestration
496(1)
Scripting
496(1)
Custom Programming
497(1)
Runbook Management for Single Nodes
498(1)
Orchestration for Multiple Nodes and Runbooks
499(1)
Automation Activities
499(1)
Change and Configuration Management
500(9)
Change Management
500(6)
Configuration Management
506(3)
Chapter Review
509(4)
Questions
509(1)
Answers
510(3)
Chapter 15 Troubleshooting 513(66)
Troubleshooting Methodology
513 (4)
Troubleshooting Steps
517(45)
Security Issues
518(13)
Exercise 15-1: Using the Google Cloud Policy Troubleshooter
528(3)
Deployment Issues
531(11)
Connectivity Issues
542(10)
Performance Issues
552(2)
Capacity Issues
554(5)
Automation and Orchestration Issues
559(3)
Documentation and Analysis
562(4)
Documentation
563(1)
Log Files
564(2)
Troubleshooting Tools
566(9)
Connectivity Tools
566(3)
Configuration Tools
569(3)
Query Tools
572(1)
Remote Administration Tools
573(2)
Chapter Review
575(4)
Questions
575(2)
Answers
577(2)
Appendix A Objective Map 579(10)
Exam CVO-003
579(10)
Appendix B About the Online Content 589(4)
System Requirements
589(1)
Your Total Seminars Training Hub Account
589(1)
Privacy Notice
589(1)
Single User License Terms and Conditions
589(2)
TotalTester Online
591(1)
Performance-Based Questions
591(1)
Technical Support
591(2)
Index 593
Eric Vanderburg is the director of information systems and security at JurInnov and a professor of computer information systems. He has spent over 15 years in the information technology and security field specializing in complex storage systems, database management systems, eCommerce, cloud computing and big data projects in both the United States and Japan. He partnered with Hitachi Data Systems in 2008 to test their Essential NAS product and has deployed numerous large enterprise storage and information systems for clients around the world. He regularly presents on technology topics at conferences and seminars and is on the board of advisors for several colleges. Vanderburg has earned over 30 certifications including the vendor neutral CompTIA Storage+ and vendor storage certifications from EMC and Hitachi Data Systems. He holds degrees in computer information systems and technology as well as an MBA and is currently completing a doctorate in information assurance. He has also served as an expert witness in legal cases requiring his technical expertise.