SKIP THE SHIPPING
Use code NOSHIP during checkout to save 40% on eligible eBooks, now through January 5. Shop now.
Register your product to gain access to bonus material or receive a coupon.
CompTIA® Cloud+ CV0-003 Exam Cram is an all-inclusive study guide designed to help you pass the updated version of the CompTIA Cloud+ exam. Prepare for test day success with complete coverage of exam objectives and topics, plus hundreds of realistic practice questions. Extensive prep tools include quizzes and our essential last-minute review CramSheet. The powerful Pearson Test Prep practice software provides real-time assessment and feedback with two complete exams.
Covers the critical information needed to score higher on your Cloud+ CV0-003 exam!
The exciting new CompTIA Cloud+ CV0-003 Exam Cram Premium Edition and Practice Test is a digital-only certification preparation product combining an eBook with enhanced Pearson IT Certification Practice Test. The Premium Edition eBook and Practice Test contains the following items:
Data Security and Compliance Controls in Cloud Environments
Download the sample pages (includes Chapter 8)
Introduction. . . . . . . . . . . . . . . . . . . . . . . xxvi
CHAPTER 1: Different Types of Cloud Models.. . . . . . . . . . . . . . . . 1
Cloud Deployment Models.. . . . . . . . . . . . . . . . 2
Cloud Service Models.. . . . . . . . . . . . . . . . . . 6
Advanced Cloud Services.. . . . . . . . . . . . . . . . . 9
Cloud Shared Responsibility Model. . . . . . . . . . . . . 11
What Next?.. . . . . . . . . . . . . . . . . . . . . 14
CHAPTER 2: Capacity Planning.. . . . . . . . . . . . . . . . . . . . . 15
Requirements.. . . . . . . . . . . . . . . . . . . . . 16
Standard Templates.. . . . . . . . . . . . . . . . . . . 18
Licensing.. . . . . . . . . . . . . . . . . . . . . . 18
User Density.. . . . . . . . . . . . . . . . . . . . . 20
System Load. . . . . . . . . . . . . . . . . . . . . 21
Trend Analysis.. . . . . . . . . . . . . . . . . . . . 21
Performance Capacity Planning.. . . . . . . . . . . . . . 22
What Next?.. . . . . . . . . . . . . . . . . . . . . 24
CHAPTER 3: High Availability and Scaling in Cloud Environments.. . . . . . . . 25
Hypervisors.. . . . . . . . . . . . . . . . . . . . . 26
Oversubscription. . . . . . . . . . . . . . . . . . . . 28
Regions and Zones.. . . . . . . . . . . . . . . . . . . 30
Applications.. . . . . . . . . . . . . . . . . . . . . 32
Containers.. . . . . . . . . . . . . . . . . . . . . . 32
Clusters.. . . . . . . . . . . . . . . . . . . . . . . 33
High Availability of Network Functions.. . . . . . . . . . . . 33
Avoid Single Points of Failure. . . . . . . . . . . . . . . 36
Scalability.. . . . . . . . . . . . . . . . . . . . . . 36
What Next?.. . . . . . . . . . . . . . . . . . . . . 39
CHAPTER 4: Solution Design in Support of the Business Requirements.. . . . . . 41
Requirement Analysis.. . . . . . . . . . . . . . . . . . 42
Environments. . . . . . . . . . . . . . . . . . . . . 48
Testing Techniques.. . . . . . . . . . . . . . . . . . . 50
What Next?.. . . . . . . . . . . . . . . . . . . . . 53
CHAPTER 5: Identity and Access Management.. . . . . . . . . . . . . . . 55
Identification and Authorization.. . . . . . . . . . . . . . 56
Directory Services. . . . . . . . . . . . . . . . . . . 60
Federation.. . . . . . . . . . . . . . . . . . . . . . 61
Certificate Management. . . . . . . . . . . . . . . . . 63
Multifactor Authentication (MFA).. . . . . . . . . . . . . . 64
Single Sign-On (SSO).. . . . . . . . . . . . . . . . . . 65
Public Key Infrastructure (PKI).. . . . . . . . . . . . . . 66
Secret Management. . . . . . . . . . . . . . . . . . . 67
Key Management.. . . . . . . . . . . . . . . . . . . 67
What Next?.. . . . . . . . . . . . . . . . . . . . . 69
CHAPTER 6: Secure a Network in a Cloud Environment. . . . . . . . . . . . 71
Network Segmentation.. . . . . . . . . . . . . . . . . 72
Protocols.. . . . . . . . . . . . . . . . . . . . . . 74
Network Services.. . . . . . . . . . . . . . . . . . . 77
Log and Event Monitoring. . . . . . . . . . . . . . . . 80
Network Flows.. . . . . . . . . . . . . . . . . . . . 80
Hardening and Configuration Changes.. . . . . . . . . . . . 81
What Next?.. . . . . . . . . . . . . . . . . . . . . 86
CHAPTER 7: OS and Application Security Controls.. . . . . . . . . . . . . . 87
Policies.. . . . . . . . . . . . . . . . . . . . . . . 88
User Permissions.. . . . . . . . . . . . . . . . . . . 90
Antivirus/Antimalware/Endpoint Detection and Response (EDR).. . . 93
Host-Based IDS (HIDS)/Host-Based IPS (HIPS).. . . . . . . . 94
Hardened Baselines.. . . . . . . . . . . . . . . . . . . 94
File Integrity.. . . . . . . . . . . . . . . . . . . . . 96
Log and Event Monitoring. . . . . . . . . . . . . . . . 96
Configuration Management.. . . . . . . . . . . . . . . . 96
Builds.. . . . . . . . . . . . . . . . . . . . . . . 96
Operating System (OS) Upgrades.. . . . . . . . . . . . . . 98
Encryption. . . . . . . . . . . . . . . . . . . . . . 98
Mandatory Access Control.. . . . . . . . . . . . . . . . 99
Firewall Software.. . . . . . . . . . . . . . . . . . . 100
What Next?.. . . . . . . . . . . . . . . . . . . . . 101
CHAPTER 8: Data Security and Compliance Controls in Cloud Environments.. . . . 103
Encryption. . . . . . . . . . . . . . . . . . . . . . 104
Integrity.. . . . . . . . . . . . . . . . . . . . . . 105
Classification.. . . . . . . . . . . . . . . . . . . . . 107
Segmentation.. . . . . . . . . . . . . . . . . . . . . 108
Access Control.. . . . . . . . . . . . . . . . . . . . 108
Impact of Laws and Regulations.. . . . . . . . . . . . . . 109
Records Management.. . . . . . . . . . . . . . . . . . 110
Data Loss Prevention (DLP).. . . . . . . . . . . . . . . 111
Cloud Access Security Broker (CASB).. . . . . . . . . . . . 111
What Next?.. . . . . . . . . . . . . . . . . . . . . 113
CHAPTER 9: Security Requirements.. . . . . . . . . . . . . . . . . . . 115
Tools.. . . . . . . . . . . . . . . . . . . . . . . . 116
Vulnerability Assessment.. . . . . . . . . . . . . . . . . 117
Security Patches.. . . . . . . . . . . . . . . . . . . . 118
Risk Register.. . . . . . . . . . . . . . . . . . . . . 120
Prioritization of Patch Applications.. . . . . . . . . . . . . 120
Deactivate Default Accounts. . . . . . . . . . . . . . . . 120
Impacts of Security Tools on Systems and Services.. . . . . . . . 121
What Next?.. . . . . . . . . . . . . . . . . . . . . 122
CHAPTER 10: Incident Response Procedures.. . . . . . . . . . . . . . . . 123
Preparation.. . . . . . . . . . . . . . . . . . . . . 124
Incident Response Procedures.. . . . . . . . . . . . . . . 130
What Next?.. . . . . . . . . . . . . . . . . . . . . 134
CHAPTER 11: Integrate Components into a Cloud Solution.. . . . . . . . . . . 135
Subscription Services. . . . . . . . . . . . . . . . . . 136
Provisioning Resources.. . . . . . . . . . . . . . . . . 140
Application. . . . . . . . . . . . . . . . . . . . . . 142
Deploying Virtual Machines (VMs) and Custom Images. . . . . . 143
Templates. . . . . . . . . . . . . . . . . . . . . . 143
Identity Management.. . . . . . . . . . . . . . . . . . 145
Containers.. . . . . . . . . . . . . . . . . . . . . . 145
Auto-scaling.. . . . . . . . . . . . . . . . . . . . . 146
Postdeployment Validation.. . . . . . . . . . . . . . . . 146
What Next?.. . . . . . . . . . . . . . . . . . . . . 148
CHAPTER 12: Storage in Cloud Environments. . . . . . . . . . . . . . . . 149
Types. . . . . . . . . . . . . . . . . . . . . . . . 150
Tiers.. . . . . . . . . . . . . . . . . . . . . . . . 152
Input/Output Operations per Second (IOPS) and Read/Write.. . . . 153
Protocols.. . . . . . . . . . . . . . . . . . . . . . 154
Redundant Array of Inexpensive Disks (RAID).. . . . . . . . . 157
Storage System Features.. . . . . . . . . . . . . . . . . 159
User Quotas. . . . . . . . . . . . . . . . . . . . . 161
Hyperconverged.. . . . . . . . . . . . . . . . . . . . 161
Software-Defined Storage (SDS). . . . . . . . . . . . . . 162
What Next?.. . . . . . . . . . . . . . . . . . . . . 163
CHAPTER 13: Cloud Networking Solutions.. . . . . . . . . . . . . . . . . 165
Services.. . . . . . . . . . . . . . . . . . . . . . . 166
Virtual Private Networks (VPNs).. . . . . . . . . . . . . . 170
Virtual Routing. . . . . . . . . . . . . . . . . . . . 171
Network Appliances.. . . . . . . . . . . . . . . . . . 176
Virtual Private Cloud (VPC). . . . . . . . . . . . . . . . 177
VLAN/VxLAN/GENEVE. . . . . . . . . . . . . . . . 178
Single Root Input/Output Virtualization (SR-IOV).. . . . . . . . 179
Software-Defined Network (SDN).. . . . . . . . . . . . . 179
What Next?.. . . . . . . . . . . . . . . . . . . . . 180
CHAPTER 14: Compute Sizing for a Deployment. . . . . . . . . . . . . . . 181
Virtualization.. . . . . . . . . . . . . . . . . . . . . 182
Central Processing Unit (CPU)/ Virtual CPU (vCPU). . . . . . . 185
Graphics Processing Unit (GPU).. . . . . . . . . . . . . . 186
Clock Speed/Instructions per Cycle (IPC).. . . . . . . . . . . 187
Hyperconverged.. . . . . . . . . . . . . . . . . . . . 188
Memory. . . . . . . . . . . . . . . . . . . . . . . 188
What Next?.. . . . . . . . . . . . . . . . . . . . . 191
CHAPTER 15: Cloud Migrations.. . . . . . . . . . . . . . . . . . . . . 193
Physical to Virtual (P2V).. . . . . . . . . . . . . . . . . 194
Virtual to Virtual (V2V).. . . . . . . . . . . . . . . . . 195
Cloud-to-Cloud Migrations.. . . . . . . . . . . . . . . . 196
Storage Migrations.. . . . . . . . . . . . . . . . . . . 198
Database Migrations.. . . . . . . . . . . . . . . . . . 200
What Next?.. . . . . . . . . . . . . . . . . . . . . 203
CHAPTER 16: Logging, Monitoring, and Alerting.. . . . . . . . . . . . . . . 205
Logging. . . . . . . . . . . . . . . . . . . . . . . 206
Monitoring.. . . . . . . . . . . . . . . . . . . . . 209
Alerting.. . . . . . . . . . . . . . . . . . . . . . . 214
What Next?.. . . . . . . . . . . . . . . . . . . . . 216
CHAPTER 17: Operation of a Cloud Environment.. . . . . . . . . . . . . . . 217
Confirm Completion of Backups. . . . . . . . . . . . . . 218
Lifecycle Management. . . . . . . . . . . . . . . . . . 218
Change Management. . . . . . . . . . . . . . . . . . 220
Asset Management.. . . . . . . . . . . . . . . . . . . 220
Patching.. . . . . . . . . . . . . . . . . . . . . . 221
Impacts of Process Improvements on Systems. . . . . . . . . . 226
Upgrade Methods.. . . . . . . . . . . . . . . . . . . 226
Dashboard and Reporting.. . . . . . . . . . . . . . . . 228
What Next?.. . . . . . . . . . . . . . . . . . . . . 234
CHAPTER 18: Optimize Cloud Environments. . . . . . . . . . . . . . . . . 235
Right-sizing.. . . . . . . . . . . . . . . . . . . . . 236
Compute and Storage.. . . . . . . . . . . . . . . . . . 236
Network.. . . . . . . . . . . . . . . . . . . . . . 237
Placement.. . . . . . . . . . . . . . . . . . . . . . 242
Geographical.. . . . . . . . . . . . . . . . . . . 242
Device Drivers and Firmware.. . . . . . . . . . . . . . . 243
What Next?.. . . . . . . . . . . . . . . . . . . . . 246
CHAPTER 19: Automation and Orchestration Techniques.. . . . . . . . . . . . 247
Infrastructure as Code (IaC).. . . . . . . . . . . . . . . . 248
Continuous Integration/Continuous Deployment (CI/CD).. . . . . 249
Version Control.. . . . . . . . . . . . . . . . . . . . 250
Configuration Management.. . . . . . . . . . . . . . . . 251
Containers.. . . . . . . . . . . . . . . . . . . . . . 252
Automation Activities.. . . . . . . . . . . . . . . . . . 252
Secure Scripting.. . . . . . . . . . . . . . . . . . . . 254
Orchestration Sequencing.. . . . . . . . . . . . . . . . 255
What Next?.. . . . . . . . . . . . . . . . . . . . . 257
CHAPTER 20: Backup and Restore Operations.. . . . . . . . . . . . . . . . 259
Backup Types.. . . . . . . . . . . . . . . . . . . . . 260
Backup Objects. . . . . . . . . . . . . . . . . . . . 263
Backup Targets.. . . . . . . . . . . . . . . . . . . . 265
Backup and Restore Policies.. . . . . . . . . . . . . . . . 266
Restoration Methods.. . . . . . . . . . . . . . . . . . 269
What Next?.. . . . . . . . . . . . . . . . . . . . . 272
CHAPTER 21: Disaster Recovery Tasks.. . . . . . . . . . . . . . . . . . 273
Failovers.. . . . . . . . . . . . . . . . . . . . . . 274
Failback.. . . . . . . . . . . . . . . . . . . . . . . 274
Restore Backups.. . . . . . . . . . . . . . . . . . . . 275
Replication. . . . . . . . . . . . . . . . . . . . . . 275
On-Premises and Cloud Sites.. . . . . . . . . . . . . . . 275
Requirements.. . . . . . . . . . . . . . . . . . . . . 277
Documentation. . . . . . . . . . . . . . . . . . . . 277
Geographical Data Center Requirements.. . . . . . . . . . . 279
What Next?.. . . . . . . . . . . . . . . . . . . . . 280
CHAPTER 22: Troubleshooting Methodology. . . . . . . . . . . . . . . . . 281
Always Consider Corporate Policies, Procedures, and Impacts Before
Implementing Changes.. . . . . . . . . . . . . . . . . 282
1. Identify the Problem.. . . . . . . . . . . . . . . . . 283
2. Establish a Theory of Probable Cause (Question the Obvious).. . . 284
3. Test the Theory to Determine Cause.. . . . . . . . . . . . 285
4. Establish a Plan of Action to Resolve the Problem and Implement the Solution... 285
5. Verify Full System Functionality and, if Applicable, Implement Preventive Measures.. 286
6. Document the Findings, Actions, and Outcomes Throughout the Process.. . 286
What Next?.. . . . . . . . . . . . . . . . . . . . . 288
CHAPTER 23: Troubleshoot Security Issues.. . . . . . . . . . . . . . . . . 289
Privilege.. . . . . . . . . . . . . . . . . . . . . . 290
Authentication.. . . . . . . . . . . . . . . . . . . . 291
Authorization.. . . . . . . . . . . . . . . . . . . . . 292
Security Groups.. . . . . . . . . . . . . . . . . . . . 293
Keys and Certificates. . . . . . . . . . . . . . . . . . 294
Misconfigured or Misapplied Policies.. . . . . . . . . . . . 295
Data Security Issues. . . . . . . . . . . . . . . . . . . 296
Exposed Endpoints.. . . . . . . . . . . . . . . . . . . 297
Misconfigured or Failed Security Appliances. . . . . . . . . . 298
Unsupported Protocols.. . . . . . . . . . . . . . . . . 298
External/Internal Attacks.. . . . . . . . . . . . . . . . . 298
What Next?.. . . . . . . . . . . . . . . . . . . . . 300
CHAPTER 24: Troubleshoot Deployment, Automation, and Orchestration Issues.. . . 301
Connectivity Issues.. . . . . . . . . . . . . . . . . . . 302
Performance Degradation.. . . . . . . . . . . . . . . . 304
Configurations.. . . . . . . . . . . . . . . . . . . . 305
Applications in Containers.. . . . . . . . . . . . . . . . 306
Misconfigured Templates.. . . . . . . . . . . . . . . . . 306
Missing or Incorrect Tags. . . . . . . . . . . . . . . . . 306
Insufficient Capacity.. . . . . . . . . . . . . . . . . . 307
Licensing Issues.. . . . . . . . . . . . . . . . . . . . 307
Vendor-Related Issues.. . . . . . . . . . . . . . . . . . 308
Account Mismatches.. . . . . . . . . . . . . . . . . . 310
Change Management Failures. . . . . . . . . . . . . . . 310
Server Name Changes.. . . . . . . . . . . . . . . . . . 311
IP Address Changes. . . . . . . . . . . . . . . . . . . 311
Location Changes.. . . . . . . . . . . . . . . . . . . 312
Version/Feature Mismatch.. . . . . . . . . . . . . . . . 312
Automation Tool Incompatibility. . . . . . . . . . . . . . 313
Job Validation Issue.. . . . . . . . . . . . . . . . . . . 314
Patching Failure.. . . . . . . . . . . . . . . . . . . . 315
What Next?.. . . . . . . . . . . . . . . . . . . . . 316
CHAPTER 25: Troubleshoot Connectivity Issues and Common Performance Issues.. . 317
Network Security Group Misconfigurations.. . . . . . . . . . 318
Common Networking Configuration Issues.. . . . . . . . . . 319
Network Troubleshooting Tools.. . . . . . . . . . . . . . 324
Resource Utilization.. . . . . . . . . . . . . . . . . . 336
Application. . . . . . . . . . . . . . . . . . . . . . 337
Incorrectly Configured or Failed Load Balancing.. . . . . . . . 338
What Next?.. . . . . . . . . . . . . . . . . . . . . 339
Glossary of Essential Terms and Components.. . . . . . . . . . . 341
9780137393251, TOC, 10/21/2021
We've made every effort to ensure the accuracy of this book and its companion content. Any errors that have been confirmed since this book was published can be downloaded below.
Download the errata (54 KB .doc)