CompTIA Cloud+ CV0-003 Exam Cram, 1st edition

Published by Pearson IT Certification (December 20, 2021) © 2022

  • William Rothwell Lead instructor and courseware developer

eTextbook

$42.99

  • Available for purchase from all major ebook resellers, including InformIT.com.
  • To request a review copy, click on the "Request a Review Copy" button.
$35.99

  • A print text (hardcover or paperback) 
  • Free shipping
  • Also available for purchase as an ebook from all major ebook resellers, including InformIT.com

Using the proven Exam Cram method of study, CompTIA Cloud+ CV0-003 Exam Cram offers comprehensive foundational learning for cloud architecture, design, security, deployment, operations, support, and troubleshooting, with every chapter mapped directly to the exam objectives.

Extensive preparation tools include:

  • topic overviews
  • exam alerts
  • CramSavers
  • CramQuizzes
  • chapter-ending review questions
  • author notes and tips
  • an extensive glossary

The handy Cram Sheet tear-out brings together:

  • tips
  • acronyms
  • memory joggers

The powerful Pearson Test Prep practice test software offers an extensive collection of exam-realistic practice questions, with many customization and reporting features: practice in study mode, practice exam mode, or flash card mode. The companion website also provides access to several digital assets including the Glossary and Cram Sheet.

  • Covers all the critical information students need to know to score higher on the updated Cloud+ exam
  • Addresses all exam objectives: cloud architecture and design, security, deployment, operations and support, and troubleshooting
  • Designed to help students rapidly assess where they stand, and quickly master what they need to learn
  • Includes test-taking strategies, time-saving tips, Exam Notes, and two full practice exams
Introduction. . . . . . . . . . . . . . . . . . . . . . . xxvi

CHAPTER 1: Different Types of Cloud Models.. . . . . . . . . . . . . . . . 1

    Cloud Deployment Models.. . . . . . . . . . . . . . . . 2

    Cloud Service Models.. . . . . . . . . . . . . . . . . . 6

    Advanced Cloud Services.. . . . . . . . . . . . . . . . . 9

    Cloud Shared Responsibility Model. . . . . . . . . . . . . 11

    What Next?.. . . . . . . . . . . . . . . . . . . . . 14

CHAPTER 2: Capacity Planning.. . . . . . . . . . . . . . . . . . . . . 15

    Requirements.. . . . . . . . . . . . . . . . . . . . . 16

    Standard Templates.. . . . . . . . . . . . . . . . . . . 18

    Licensing.. . . . . . . . . . . . . . . . . . . . . . 18

    User Density.. . . . . . . . . . . . . . . . . . . . . 20

    System Load. . . . . . . . . . . . . . . . . . . . . 21

    Trend Analysis.. . . . . . . . . . . . . . . . . . . . 21

    Performance Capacity Planning.. . . . . . . . . . . . . . 22

    What Next?.. . . . . . . . . . . . . . . . . . . . . 24

CHAPTER 3: High Availability and Scaling in Cloud Environments.. . . . . . . . 25

    Hypervisors.. . . . . . . . . . . . . . . . . . . . . 26

    Oversubscription. . . . . . . . . . . . . . . . . . . . 28

    Regions and Zones.. . . . . . . . . . . . . . . . . . . 30

    Applications.. . . . . . . . . . . . . . . . . . . . . 32

    Containers.. . . . . . . . . . . . . . . . . . . . . . 32

    Clusters.. . . . . . . . . . . . . . . . . . . . . . . 33

    High Availability of Network Functions.. . . . . . . . . . . . 33

    Avoid Single Points of Failure. . . . . . . . . . . . . . . 36

    Scalability.. . . . . . . . . . . . . . . . . . . . . . 36

    What Next?.. . . . . . . . . . . . . . . . . . . . . 39

CHAPTER 4: Solution Design in Support of the Business Requirements.. . . . . . 41

    Requirement Analysis.. . . . . . . . . . . . . . . . . . 42

    Environments. . . . . . . . . . . . . . . . . . . . . 48

    Testing Techniques.. . . . . . . . . . . . . . . . . . . 50

    What Next?.. . . . . . . . . . . . . . . . . . . . . 53

CHAPTER 5: Identity and Access Management.. . . . . . . . . . . . . . . 55

    Identification and Authorization.. . . . . . . . . . . . . . 56

    Directory Services. . . . . . . . . . . . . . . . . . . 60

    Federation.. . . . . . . . . . . . . . . . . . . . . . 61

    Certificate Management. . . . . . . . . . . . . . . . . 63

    Multifactor Authentication (MFA).. . . . . . . . . . . . . . 64

    Single Sign-On (SSO).. . . . . . . . . . . . . . . . . . 65

    Public Key Infrastructure (PKI).. . . . . . . . . . . . . . 66

    Secret Management. . . . . . . . . . . . . . . . . . . 67

    Key Management.. . . . . . . . . . . . . . . . . . . 67

    What Next?.. . . . . . . . . . . . . . . . . . . . . 69

CHAPTER 6: Secure a Network in a Cloud Environment. . . . . . . . . . . . 71

    Network Segmentation.. . . . . . . . . . . . . . . . . 72

    Protocols.. . . . . . . . . . . . . . . . . . . . . . 74

    Network Services.. . . . . . . . . . . . . . . . . . . 77

    Log and Event Monitoring. . . . . . . . . . . . . . . . 80

    Network Flows.. . . . . . . . . . . . . . . . . . . . 80

    Hardening and Configuration Changes.. . . . . . . . . . . . 81

    What Next?.. . . . . . . . . . . . . . . . . . . . . 86

CHAPTER 7: OS and Application Security Controls.. . . . . . . . . . . . . . 87

    Policies.. . . . . . . . . . . . . . . . . . . . . . . 88

    User Permissions.. . . . . . . . . . . . . . . . . . . 90

    Antivirus/Antimalware/Endpoint Detection and Response (EDR).. . . 93

    Host-Based IDS (HIDS)/Host-Based IPS (HIPS).. . . . . . . . 94

    Hardened Baselines.. . . . . . . . . . . . . . . . . . . 94

    File Integrity.. . . . . . . . . . . . . . . . . . . . . 96

    Log and Event Monitoring. . . . . . . . . . . . . . . . 96

    Configuration Management.. . . . . . . . . . . . . . . . 96

    Builds.. . . . . . . . . . . . . . . . . . . . . . . 96

    Operating System (OS) Upgrades.. . . . . . . . . . . . . . 98

    Encryption. . . . . . . . . . . . . . . . . . . . . . 98

    Mandatory Access Control.. . . . . . . . . . . . . . . . 99

    Firewall Software.. . . . . . . . . . . . . . . . . . . 100

    What Next?.. . . . . . . . . . . . . . . . . . . . . 101

CHAPTER 8: Data Security and Compliance Controls in Cloud Environments.. . . . 103

    Encryption. . . . . . . . . . . . . . . . . . . . . . 104

    Integrity.. . . . . . . . . . . . . . . . . . . . . . 105

    Classification.. . . . . . . . . . . . . . . . . . . . . 107

    Segmentation.. . . . . . . . . . . . . . . . . . . . . 108

    Access Control.. . . . . . . . . . . . . . . . . . . . 108

    Impact of Laws and Regulations.. . . . . . . . . . . . . . 109

    Records Management.. . . . . . . . . . . . . . . . . . 110

    Data Loss Prevention (DLP).. . . . . . . . . . . . . . . 111

    Cloud Access Security Broker (CASB).. . . . . . . . . . . . 111

    What Next?.. . . . . . . . . . . . . . . . . . . . . 113

CHAPTER 9: Security Requirements.. . . . . . . . . . . . . . . . . . . 115

    Tools.. . . . . . . . . . . . . . . . . . . . . . . . 116

    Vulnerability Assessment.. . . . . . . . . . . . . . . . . 117

    Security Patches.. . . . . . . . . . . . . . . . . . . . 118

    Risk Register.. . . . . . . . . . . . . . . . . . . . . 120

    Prioritization of Patch Applications.. . . . . . . . . . . . . 120

    Deactivate Default Accounts. . . . . . . . . . . . . . . . 120

    Impacts of Security Tools on Systems and Services.. . . . . . . . 121

    What Next?.. . . . . . . . . . . . . . . . . . . . . 122

CHAPTER 10: Incident Response Procedures.. . . . . . . . . . . . . . . . 123

    Preparation.. . . . . . . . . . . . . . . . . . . . . 124

    Incident Response Procedures.. . . . . . . . . . . . . . . 130

    What Next?.. . . . . . . . . . . . . . . . . . . . . 134

CHAPTER 11: Integrate Components into a Cloud Solution.. . . . . . . . . . . 135

    Subscription Services. . . . . . . . . . . . . . . . . . 136

    Provisioning Resources.. . . . . . . . . . . . . . . . . 140

    Application. . . . . . . . . . . . . . . . . . . . . . 142

    Deploying Virtual Machines (VMs) and Custom Images. . . . . . 143

    Templates. . . . . . . . . . . . . . . . . . . . . . 143

    Identity Management.. . . . . . . . . . . . . . . . . . 145

    Containers.. . . . . . . . . . . . . . . . . . . . . . 145

    Auto-scaling.. . . . . . . . . . . . . . . . . . . . . 146

    Postdeployment Validation.. . . . . . . . . . . . . . . . 146

    What Next?.. . . . . . . . . . . . . . . . . . . . . 148

CHAPTER 12: Storage in Cloud Environments. . . . . . . . . . . . . . . . 149

    Types. . . . . . . . . . . . . . . . . . . . . . . . 150

    Tiers.. . . . . . . . . . . . . . . . . . . . . . . . 152

    Input/Output Operations per Second (IOPS) and Read/Write.. . . . 153

    Protocols.. . . . . . . . . . . . . . . . . . . . . . 154

    Redundant Array of Inexpensive Disks (RAID).. . . . . . . . . 157

    Storage System Features.. . . . . . . . . . . . . . . . . 159

    User Quotas. . . . . . . . . . . . . . . . . . . . . 161

    Hyperconverged.. . . . . . . . . . . . . . . . . . . . 161

    Software-Defined Storage (SDS). . . . . . . . . . . . . . 162

    What Next?.. . . . . . . . . . . . . . . . . . . . . 163

CHAPTER 13: Cloud Networking Solutions.. . . . . . . . . . . . . . . . . 165

    Services.. . . . . . . . . . . . . . . . . . . . . . . 166

    Virtual Private Networks (VPNs).. . . . . . . . . . . . . . 170

    Virtual Routing. . . . . . . . . . . . . . . . . . . . 171

    Network Appliances.. . . . . . . . . . . . . . . . . . 176

    Virtual Private Cloud (VPC). . . . . . . . . . . . . . . . 177

    VLAN/VxLAN/GENEVE. . . . . . . . . . . . . . . . 178

    Single Root Input/Output Virtualization (SR-IOV).. . . . . . . . 179

    Software-Defined Network (SDN).. . . . . . . . . . . . . 179

    What Next?.. . . . . . . . . . . . . . . . . . . . . 180

CHAPTER 14: Compute Sizing for a Deployment. . . . . . . . . . . . . . . 181

    Virtualization.. . . . . . . . . . . . . . . . . . . . . 182

    Central Processing Unit (CPU)/ Virtual CPU (vCPU). . . . . . . 185

    Graphics Processing Unit (GPU).. . . . . . . . . . . . . . 186

    Clock Speed/Instructions per Cycle (IPC).. . . . . . . . . . . 187

    Hyperconverged.. . . . . . . . . . . . . . . . . . . . 188

    Memory. . . . . . . . . . . . . . . . . . . . . . . 188

    What Next?.. . . . . . . . . . . . . . . . . . . . . 191

CHAPTER 15: Cloud Migrations.. . . . . . . . . . . . . . . . . . . . . 193

    Physical to Virtual (P2V).. . . . . . . . . . . . . . . . . 194

    Virtual to Virtual (V2V).. . . . . . . . . . . . . . . . . 195

    Cloud-to-Cloud Migrations.. . . . . . . . . . . . . . . . 196

    Storage Migrations.. . . . . . . . . . . . . . . . . . . 198

    Database Migrations.. . . . . . . . . . . . . . . . . . 200

    What Next?.. . . . . . . . . . . . . . . . . . . . . 203

CHAPTER 16: Logging, Monitoring, and Alerting.. . . . . . . . . . . . . . . 205

    Logging. . . . . . . . . . . . . . . . . . . . . . . 206

    Monitoring.. . . . . . . . . . . . . . . . . . . . . 209

    Alerting.. . . . . . . . . . . . . . . . . . . . . . . 214

    What Next?.. . . . . . . . . . . . . . . . . . . . . 216

CHAPTER 17: Operation of a Cloud Environment.. . . . . . . . . . . . . . . 217

    Confirm Completion of Backups. . . . . . . . . . . . . . 218

    Lifecycle Management. . . . . . . . . . . . . . . . . . 218

    Change Management. . . . . . . . . . . . . . . . . . 220

    Asset Management.. . . . . . . . . . . . . . . . . . . 220

    Patching.. . . . . . . . . . . . . . . . . . . . . . 221

    Impacts of Process Improvements on Systems. . . . . . . . . . 226

    Upgrade Methods.. . . . . . . . . . . . . . . . . . . 226

    Dashboard and Reporting.. . . . . . . . . . . . . . . . 228

    What Next?.. . . . . . . . . . . . . . . . . . . . . 234

CHAPTER 18: Optimize Cloud Environments. . . . . . . . . . . . . . . . . 235

    Right-sizing.. . . . . . . . . . . . . . . . . . . . . 236

    Compute and Storage.. . . . . . . . . . . . . . . . . . 236

    Network.. . . . . . . . . . . . . . . . . . . . . . 237

    Placement.. . . . . . . . . . . . . . . . . . . . . . 242

    Geographical.. . . . . . . . . . . . . . . . . . . 242

    Device Drivers and Firmware.. . . . . . . . . . . . . . . 243

    What Next?.. . . . . . . . . . . . . . . . . . . . . 246

CHAPTER 19: Automation and Orchestration Techniques.. . . . . . . . . . . . 247

    Infrastructure as Code (IaC).. . . . . . . . . . . . . . . . 248

    Continuous Integration/Continuous Deployment (CI/CD).. . . . . 249

    Version Control.. . . . . . . . . . . . . . . . . . . . 250

    Configuration Management.. . . . . . . . . . . . . . . . 251

    Containers.. . . . . . . . . . . . . . . . . . . . . . 252

    Automation Activities.. . . . . . . . . . . . . . . . . . 252

    Secure Scripting.. . . . . . . . . . . . . . . . . . . . 254

    Orchestration Sequencing.. . . . . . . . . . . . . . . . 255

    What Next?.. . . . . . . . . . . . . . . . . . . . . 257

CHAPTER 20: Backup and Restore Operations.. . . . . . . . . . . . . . . . 259

    Backup Types.. . . . . . . . . . . . . . . . . . . . . 260

    Backup Objects. . . . . . . . . . . . . . . . . . . . 263

    Backup Targets.. . . . . . . . . . . . . . . . . . . . 265

    Backup and Restore Policies.. . . . . . . . . . . . . . . . 266

    Restoration Methods.. . . . . . . . . . . . . . . . . . 269

    What Next?.. . . . . . . . . . . . . . . . . . . . . 272

CHAPTER 21: Disaster Recovery Tasks.. . . . . . . . . . . . . . . . . . 273

    Failovers.. . . . . . . . . . . . . . . . . . . . . . 274

    Failback.. . . . . . . . . . . . . . . . . . . . . . . 274

    Restore Backups.. . . . . . . . . . . . . . . . . . . . 275

    Replication. . . . . . . . . . . . . . . . . . . . . . 275

    On-Premises and Cloud Sites.. . . . . . . . . . . . . . . 275

    Requirements.. . . . . . . . . . . . . . . . . . . . . 277

    Documentation. . . . . . . . . . . . . . . . . . . . 277

    Geographical Data Center Requirements.. . . . . . . . . . . 279

    What Next?.. . . . . . . . . . . . . . . . . . . . . 280

CHAPTER 22: Troubleshooting Methodology. . . . . . . . . . . . . . . . . 281

    Always Consider Corporate Policies, Procedures, and Impacts Before

    Implementing Changes.. . . . . . . . . . . . . . . . . 282

    1. Identify the Problem.. . . . . . . . . . . . . . . . . 283

    2. Establish a Theory of Probable Cause (Question the Obvious).. . . 284

    3. Test the Theory to Determine Cause.. . . . . . . . . . . . 285

    4. Establish a Plan of Action to Resolve the Problem and Implement the Solution... 285

    5. Verify Full System Functionality and, if Applicable, Implement Preventive Measures.. 286

    6. Document the Findings, Actions, and Outcomes Throughout the Process.. . 286

    What Next?.. . . . . . . . . . . . . . . . . . . . . 288

CHAPTER 23: Troubleshoot Security Issues.. . . . . . . . . . . . . . . . . 289

    Privilege.. . . . . . . . . . . . . . . . . . . . . . 290

    Authentication.. . . . . . . . . . . . . . . . . . . . 291

    Authorization.. . . . . . . . . . . . . . . . . . . . . 292

    Security Groups.. . . . . . . . . . . . . . . . . . . . 293

    Keys and Certificates. . . . . . . . . . . . . . . . . . 294

    Misconfigured or Misapplied Policies.. . . . . . . . . . . . 295

    Data Security Issues. . . . . . . . . . . . . . . . . . . 296

    Exposed Endpoints.. . . . . . . . . . . . . . . . . . . 297

    Misconfigured or Failed Security Appliances. . . . . . . . . . 298

    Unsupported Protocols.. . . . . . . . . . . . . . . . . 298

    External/Internal Attacks.. . . . . . . . . . . . . . . . . 298

    What Next?.. . . . . . . . . . . . . . . . . . . . . 300

CHAPTER 24: Troubleshoot Deployment, Automation, and Orchestration Issues.. . . 301

    Connectivity Issues.. . . . . . . . . . . . . . . . . . . 302

    Performance Degradation.. . . . . . . . . . . . . . . . 304

    Configurations.. . . . . . . . . . . . . . . . . . . . 305

    Applications in Containers.. . . . . . . . . . . . . . . . 306

    Misconfigured Templates.. . . . . . . . . . . . . . . . . 306

    Missing or Incorrect Tags. . . . . . . . . . . . . . . . . 306

    Insufficient Capacity.. . . . . . . . . . . . . . . . . . 307

    Licensing Issues.. . . . . . . . . . . . . . . . . . . . 307

    Vendor-Related Issues.. . . . . . . . . . . . . . . . . . 308

    Account Mismatches.. . . . . . . . . . . . . . . . . . 310

    Change Management Failures. . . . . . . . . . . . . . . 310

    Server Name Changes.. . . . . . . . . . . . . . . . . . 311

    IP Address Changes. . . . . . . . . . . . . . . . . . . 311

    Location Changes.. . . . . . . . . . . . . . . . . . . 312

    Version/Feature Mismatch.. . . . . . . . . . . . . . . . 312

    Automation Tool Incompatibility. . . . . . . . . . . . . . 313

    Job Validation Issue.. . . . . . . . . . . . . . . . . . . 314

    Patching Failure.. . . . . . . . . . . . . . . . . . . . 315

    What Next?.. . . . . . . . . . . . . . . . . . . . . 316

CHAPTER 25: Troubleshoot Connectivity Issues and Common Performance Issues.. . 317

    Network Security Group Misconfigurations.. . . . . . . . . . 318

    Common Networking Configuration Issues.. . . . . . . . . . 319

    Network Troubleshooting Tools.. . . . . . . . . . . . . . 324

    Resource Utilization.. . . . . . . . . . . . . . . . . . 336

    Application. . . . . . . . . . . . . . . . . . . . . . 337

    Incorrectly Configured or Failed Load Balancing.. . . . . . . . 338

    What Next?.. . . . . . . . . . . . . . . . . . . . . 339

Glossary of Essential Terms and Components.. . . . . . . . . . . 341



9780137393251, TOC, 10/21/2021


At the impressionable age of 14, William “Bo” Rothwell crossed paths with a TRS-80 Micro Computer System (affectionately known as a “Trash 80”). Soon after, the adults responsible for Bo made the mistake of leaving him alone with the TSR-80. He immediately dismantled it and held his first computer class, showing his friends what made this “computer thing” work. Since that experience, Bo's passion for understanding how computers work and sharing this knowledge with others has resulted in a rewarding career in IT training. His experience includes cloud, Linux, UNIX, IT security, DevOps, and programming languages such as Perl, Python, Tcl, and BASH. He is the founder and lead instructor of One Course Source, an IT training organization.

Need help? Get in touch

Video
Play
Privacy and cookies
By watching, you agree Pearson can share your viewership data for marketing and analytics for one year, revocable upon changing cookie preferences. Disabling cookies may affect video functionality. More info...

Pearson eTextbook: What’s on the inside just might surprise you

They say you can’t judge a book by its cover. It’s the same with your students. Meet each one right where they are with an engaging, interactive, personalized learning experience that goes beyond the textbook to fit any schedule, any budget, and any lifestyle.