CompTIA Cloud+ CV0-003 Exam Cram

Specificaties
Paperback, blz. | Engels
Pearson Education | e druk, 2022
ISBN13: 9780137393251
Rubricering
Pearson Education e druk, 2022 9780137393251
Onderdeel van serie Exam Cram
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Using the proven Exam Cram method of study, CompTIA Cloud+ CV0-003 Exam Cram offers comprehensive foundational learning for cloud architecture, design, security, deployment, operations, support, and troubleshooting, with every chapter mapped directly to the exam objectives.

Extensive preparation tools include: topic overviews exam alerts CramSavers CramQuizzes chapter-ending review questions author notes and tips an extensive glossary

The handy Cram Sheet tear-out brings together: tips acronyms memory joggers

The powerful Pearson Test Prep practice test software offers an extensive collection of exam-realistic practice questions, with many customization and reporting features: practice in study mode, practice exam mode, or flash card mode. The companion website also provides access to several digital assets including the Glossary and Cram Sheet.

Specificaties

ISBN13:9780137393251
Taal:Engels
Bindwijze:paperback
Serie:Exam Cram

Inhoudsopgave

<div> Introduction. . . . . . . . . . . . . . . . . . . . . . . xxvi </div> <div> <br> </div> <div> CHAPTER 1: Different Types of Cloud Models.. . . . . . . . . . . . . . . . 1 </div> <div> <br> </div> <div> &nbsp; &nbsp; Cloud Deployment Models.. . . . . . . . . . . . . . . . 2 </div> <div> <br> </div> <div> &nbsp; &nbsp; Cloud Service Models.. . . . . . . . . . . . . . . . . . 6 </div> <div> <br> </div> <div> &nbsp; &nbsp; Advanced Cloud Services.. . . . . . . . . . . . . . . . . 9 </div> <div> <br> </div> <div> &nbsp; &nbsp; Cloud Shared Responsibility Model. . . . . . . . . . . . . 11 </div> <div> <br> </div> <div> &nbsp; &nbsp; What Next?.. . . . . . . . . . . . . . . . . . . . . 14 </div> <div> <br> </div> <div> CHAPTER 2: Capacity Planning.. . . . . . . . . . . . . . . . . . . . . 15 </div> <div> <br> </div> <div> &nbsp; &nbsp; Requirements.. . . . . . . . . . . . . . . . . . . . . 16 </div> <div> <br> </div> <div> &nbsp; &nbsp; Standard Templates.. . . . . . . . . . . . . . . . . . . 18 </div> <div> <br> </div> <div> &nbsp; &nbsp; Licensing.. . . . . . . . . . . . . . . . . . . . . . 18 </div> <div> <br> </div> <div> &nbsp; &nbsp; User Density.. . . . . . . . . . . . . . . . . . . . . 20 </div> <div> <br> </div> <div> &nbsp; &nbsp; System Load. . . . . . . . . . . . . . . . . . . . . 21 </div> <div> <br> </div> <div> &nbsp; &nbsp; Trend Analysis.. . . . . . . . . . . . . . . . . . . . 21 </div> <div> <br> </div> <div> &nbsp; &nbsp; Performance Capacity Planning.. . . . . . . . . . . . . . 22 </div> <div> <br> </div> <div> &nbsp; &nbsp; What Next?.. . . . . . . . . . . . . . . . . . . . . 24 </div> <div> <br> </div> <div> CHAPTER 3: High Availability and Scaling in Cloud Environments.. . . . . . . . 25 </div> <div> <br> </div> <div> &nbsp; &nbsp; Hypervisors.. . . . . . . . . . . . . . . . . . . . . 26 </div> <div> <br> </div> <div> &nbsp; &nbsp; Oversubscription. . . . . . . . . . . . . . . . . . . . 28 </div> <div> <br> </div> <div> &nbsp; &nbsp; Regions and Zones.. . . . . . . . . . . . . . . . . . . 30 </div> <div> <br> </div> <div> &nbsp; &nbsp; Applications.. . . . . . . . . . . . . . . . . . . . . 32 </div> <div> <br> </div> <div> &nbsp; &nbsp; Containers.. . . . . . . . . . . . . . . . . . . . . . 32 </div> <div> <br> </div> <div> &nbsp; &nbsp; Clusters.. . . . . . . . . . . . . . . . . . . . . . . 33 </div> <div> <br> </div> <div> &nbsp; &nbsp; High Availability of Network Functions.. . . . . . . . . . . . 33 </div> <div> <br> </div> <div> &nbsp; &nbsp; Avoid Single Points of Failure. . . . . . . . . . . . . . . 36 </div> <div> <br> </div> <div> &nbsp; &nbsp; Scalability.. . . . . . . . . . . . . . . . . . . . . . 36 </div> <div> <br> </div> <div> &nbsp; &nbsp; What Next?.. . . . . . . . . . . . . . . . . . . . . 39 </div> <div> <br> </div> <div> CHAPTER 4: Solution Design in Support of the Business Requirements.. . . . . . 41 </div> <div> <br> </div> <div> &nbsp; &nbsp; Requirement Analysis.. . . . . . . . . . . . . . . . . . 42 </div> <div> <br> </div> <div> &nbsp; &nbsp; Environments. . . . . . . . . . . . . . . . . . . . . 48 </div> <div> <br> </div> <div> &nbsp; &nbsp; Testing Techniques.. . . . . . . . . . . . . . . . . . . 50 </div> <div> <br> </div> <div> &nbsp; &nbsp; What Next?.. . . . . . . . . . . . . . . . . . . . . 53 </div> <div> <br> </div> <div> CHAPTER 5: Identity and Access Management.. . . . . . . . . . . . . . . 55 </div> <div> <br> </div> <div> &nbsp; &nbsp; Identification and Authorization.. . . . . . . . . . . . . . 56 </div> <div> <br> </div> <div> &nbsp; &nbsp; Directory Services. . . . . . . . . . . . . . . . . . . 60 </div> <div> <br> </div> <div> &nbsp; &nbsp; Federation.. . . . . . . . . . . . . . . . . . . . . . 61 </div> <div> <br> </div> <div> &nbsp; &nbsp; Certificate Management. . . . . . . . . . . . . . . . . 63 </div> <div> <br> </div> <div> &nbsp; &nbsp; Multifactor Authentication (MFA).. . . . . . . . . . . . . . 64 </div> <div> <br> </div> <div> &nbsp; &nbsp; Single Sign-On (SSO).. . . . . . . . . . . . . . . . . . 65 </div> <div> <br> </div> <div> &nbsp; &nbsp; Public Key Infrastructure (PKI).. . . . . . . . . . . . . . 66 </div> <div> <br> </div> <div> &nbsp; &nbsp; Secret Management. . . . . . . . . . . . . . . . . . . 67 </div> <div> <br> </div> <div> &nbsp; &nbsp; Key Management.. . . . . . . . . . . . . . . . . . . 67 </div> <div> <br> </div> <div> &nbsp; &nbsp; What Next?.. . . . . . . . . . . . . . . . . . . . . 69 </div> <div> <br> </div> <div> CHAPTER 6: Secure a Network in a Cloud Environment. . . . . . . . . . . . 71 </div> <div> <br> </div> <div> &nbsp; &nbsp; Network Segmentation.. . . . . . . . . . . . . . . . . 72 </div> <div> <br> </div> <div> &nbsp; &nbsp; Protocols.. . . . . . . . . . . . . . . . . . . . . . 74 </div> <div> <br> </div> <div> &nbsp; &nbsp; Network Services.. . . . . . . . . . . . . . . . . . . 77 </div> <div> <br> </div> <div> &nbsp; &nbsp; Log and Event Monitoring. . . . . . . . . . . . . . . . 80 </div> <div> <br> </div> <div> &nbsp; &nbsp; Network Flows.. . . . . . . . . . . . . . . . . . . . 80 </div> <div> <br> </div> <div> &nbsp; &nbsp; Hardening and Configuration Changes.. . . . . . . . . . . . 81 </div> <div> <br> </div> <div> &nbsp; &nbsp; What Next?.. . . . . . . . . . . . . . . . . . . . . 86 </div> <div> <br> </div> <div> CHAPTER 7: OS and Application Security Controls.. . . . . . . . . . . . . . 87 </div> <div> <br> </div> <div> &nbsp; &nbsp; Policies.. . . . . . . . . . . . . . . . . . . . . . . 88 </div> <div> <br> </div> <div> &nbsp; &nbsp; User Permissions.. . . . . . . . . . . . . . . . . . . 90 </div> <div> <br> </div> <div> &nbsp; &nbsp; Antivirus/Antimalware/Endpoint Detection and Response (EDR).. . . 93 </div> <div> <br> </div> <div> &nbsp; &nbsp; Host-Based IDS (HIDS)/Host-Based IPS (HIPS).. . . . . . . . 94 </div> <div> <br> </div> <div> &nbsp; &nbsp; Hardened Baselines.. . . . . . . . . . . . . . . . . . . 94 </div> <div> <br> </div> <div> &nbsp; &nbsp; File Integrity.. . . . . . . . . . . . . . . . . . . . . 96 </div> <div> <br> </div> <div> &nbsp; &nbsp; Log and Event Monitoring. . . . . . . . . . . . . . . . 96 </div> <div> <br> </div> <div> &nbsp; &nbsp; Configuration Management.. . . . . . . . . . . . . . . . 96 </div> <div> <br> </div> <div> &nbsp; &nbsp; Builds.. . . . . . . . . . . . . . . . . . . . . . . 96 </div> <div> <br> </div> <div> &nbsp; &nbsp; Operating System (OS) Upgrades.. . . . . . . . . . . . . . 98 </div> <div> <br> </div> <div> &nbsp; &nbsp; Encryption. . . . . . . . . . . . . . . . . . . . . . 98 </div> <div> <br> </div> <div> &nbsp; &nbsp; Mandatory Access Control.. . . . . . . . . . . . . . . . 99 </div> <div> <br> </div> <div> &nbsp; &nbsp; Firewall Software.. . . . . . . . . . . . . . . . . . . 100 </div> <div> <br> </div> <div> &nbsp; &nbsp; What Next?.. . . . . . . . . . . . . . . . . . . . . 101 </div> <div> <br> </div> <div> CHAPTER 8: Data Security and Compliance Controls in Cloud Environments.. . . . 103 </div> <div> <br> </div> <div> &nbsp; &nbsp; Encryption. . . . . . . . . . . . . . . . . . . . . . 104 </div> <div> <br> </div> <div> &nbsp; &nbsp; Integrity.. . . . . . . . . . . . . . . . . . . . . . 105 </div> <div> <br> </div> <div> &nbsp; &nbsp; Classification.. . . . . . . . . . . . . . . . . . . . . 107 </div> <div> <br> </div> <div> &nbsp; &nbsp; Segmentation.. . . . . . . . . . . . . . . . . . . . . 108 </div> <div> <br> </div> <div> &nbsp; &nbsp; Access Control.. . . . . . . . . . . . . . . . . . . . 108 </div> <div> <br> </div> <div> &nbsp; &nbsp; Impact of Laws and Regulations.. . . . . . . . . . . . . . 109 </div> <div> <br> </div> <div> &nbsp; &nbsp; Records Management.. . . . . . . . . . . . . . . . . . 110 </div> <div> <br> </div> <div> &nbsp; &nbsp; Data Loss Prevention (DLP).. . . . . . . . . . . . . . . 111 </div> <div> <br> </div> <div> &nbsp; &nbsp; Cloud Access Security Broker (CASB).. . . . . . . . . . . . 111 </div> <div> <br> </div> <div> &nbsp; &nbsp; What Next?.. . . . . . . . . . . . . . . . . . . . . 113 </div> <div> <br> </div> <div> CHAPTER 9: Security Requirements.. . . . . . . . . . . . . . . . . . . 115 </div> <div> <br> </div> <div> &nbsp; &nbsp; Tools.. . . . . . . . . . . . . . . . . . . . . . . . 116 </div> <div> <br> </div> <div> &nbsp; &nbsp; Vulnerability Assessment.. . . . . . . . . . . . . . . . . 117 </div> <div> <br> </div> <div> &nbsp; &nbsp; Security Patches.. . . . . . . . . . . . . . . . . . . . 118 </div> <div> <br> </div> <div> &nbsp; &nbsp; Risk Register.. . . . . . . . . . . . . . . . . . . . . 120 </div> <div> <br> </div> <div> &nbsp; &nbsp; Prioritization of Patch Applications.. . . . . . . . . . . . . 120 </div> <div> <br> </div> <div> &nbsp; &nbsp; Deactivate Default Accounts. . . . . . . . . . . . . . . . 120 </div> <div> <br> </div> <div> &nbsp; &nbsp; Impacts of Security Tools on Systems and Services.. . . . . . . . 121 </div> <div> <br> </div> <div> &nbsp; &nbsp; What Next?.. . . . . . . . . . . . . . . . . . . . . 122 </div> <div> <br> </div> <div> CHAPTER 10: Incident Response Procedures.. . . . . . . . . . . . . . . . 123 </div> <div> <br> </div> <div> &nbsp; &nbsp; Preparation.. . . . . . . . . . . . . . . . . . . . . 124 </div> <div> <br> </div> <div> &nbsp; &nbsp; Incident Response Procedures.. . . . . . . . . . . . . . . 130 </div> <div> <br> </div> <div> &nbsp; &nbsp; What Next?.. . . . . . . . . . . . . . . . . . . . . 134 </div> <div> <br> </div> <div> CHAPTER 11: Integrate Components into a Cloud Solution.. . . . . . . . . . . 135 </div> <div> <br> </div> <div> &nbsp; &nbsp; Subscription Services. . . . . . . . . . . . . . . . . . 136 </div> <div> <br> </div> <div> &nbsp; &nbsp; Provisioning Resources.. . . . . . . . . . . . . . . . . 140 </div> <div> <br> </div> <div> &nbsp; &nbsp; Application. . . . . . . . . . . . . . . . . . . . . . 142 </div> <div> <br> </div> <div> &nbsp; &nbsp; Deploying Virtual Machines (VMs) and Custom Images. . . . . . 143 </div> <div> <br> </div> <div> &nbsp; &nbsp; Templates. . . . . . . . . . . . . . . . . . . . . . 143 </div> <div> <br> </div> <div> &nbsp; &nbsp; Identity Management.. . . . . . . . . . . . . . . . . . 145 </div> <div> <br> </div> <div> &nbsp; &nbsp; Containers.. . . . . . . . . . . . . . . . . . . . . . 145 </div> <div> <br> </div> <div> &nbsp; &nbsp; Auto-scaling.. . . . . . . . . . . . . . . . . . . . . 146 </div> <div> <br> </div> <div> &nbsp; &nbsp; Postdeployment Validation.. . . . . . . . . . . . . . . . 146 </div> <div> <br> </div> <div> &nbsp; &nbsp; What Next?.. . . . . . . . . . . . . . . . . . . . . 148 </div> <div> <br> </div> <div> CHAPTER 12: Storage in Cloud Environments. . . . . . . . . . . . . . . . 149 </div> <div> <br> </div> <div> &nbsp; &nbsp; Types. . . . . . . . . . . . . . . . . . . . . . . . 150 </div> <div> <br> </div> <div> &nbsp; &nbsp; Tiers.. . . . . . . . . . . . . . . . . . . . . . . . 152 </div> <div> <br> </div> <div> &nbsp; &nbsp; Input/Output Operations per Second (IOPS) and Read/Write.. . . . 153 </div> <div> <br> </div> <div> &nbsp; &nbsp; Protocols.. . . . . . . . . . . . . . . . . . . . . . 154 </div> <div> <br> </div> <div> &nbsp; &nbsp; Redundant Array of Inexpensive Disks (RAID).. . . . . . . . . 157 </div> <div> <br> </div> <div> &nbsp; &nbsp; Storage System Features.. . . . . . . . . . . . . . . . . 159 </div> <div> <br> </div> <div> &nbsp; &nbsp; User Quotas. . . . . . . . . . . . . . . . . . . . . 161 </div> <div> <br> </div> <div> &nbsp; &nbsp; Hyperconverged.. . . . . . . . . . . . . . . . . . . . 161 </div> <div> <br> </div> <div> &nbsp; &nbsp; Software-Defined Storage (SDS). . . . . . . . . . . . . . 162 </div> <div> <br> </div> <div> &nbsp; &nbsp; What Next?.. . . . . . . . . . . . . . . . . . . . . 163 </div> <div> <br> </div> <div> CHAPTER 13: Cloud Networking Solutions.. . . . . . . . . . . . . . . . . 165 </div> <div> <br> </div> <div> &nbsp; &nbsp; Services.. . . . . . . . . . . . . . . . . . . . . . . 166 </div> <div> <br> </div> <div> &nbsp; &nbsp; Virtual Private Networks (VPNs).. . . . . . . . . . . . . . 170 </div> <div> <br> </div> <div> &nbsp; &nbsp; Virtual Routing. . . . . . . . . . . . . . . . . . . . 171 </div> <div> <br> </div> <div> &nbsp; &nbsp; Network Appliances.. . . . . . . . . . . . . . . . . . 176 </div> <div> <br> </div> <div> &nbsp; &nbsp; Virtual Private Cloud (VPC). . . . . . . . . . . . . . . . 177 </div> <div> <br> </div> <div> &nbsp; &nbsp; VLAN/VxLAN/GENEVE. . . . . . . . . . . . . . . . 178 </div> <div> <br> </div> <div> &nbsp; &nbsp; Single Root Input/Output Virtualization (SR-IOV).. . . . . . . . 179 </div> <div> <br> </div> <div> &nbsp; &nbsp; Software-Defined Network (SDN).. . . . . . . . . . . . . 179 </div> <div> <br> </div> <div> &nbsp; &nbsp; What Next?.. . . . . . . . . . . . . . . . . . . . . 180 </div> <div> <br> </div> <div> CHAPTER 14: Compute Sizing for a Deployment. . . . . . . . . . . . . . . 181 </div> <div> <br> </div> <div> &nbsp; &nbsp; Virtualization.. . . . . . . . . . . . . . . . . . . . . 182 </div> <div> <br> </div> <div> &nbsp; &nbsp; Central Processing Unit (CPU)/ Virtual CPU (vCPU). . . . . . . 185 </div> <div> <br> </div> <div> &nbsp; &nbsp; Graphics Processing Unit (GPU).. . . . . . . . . . . . . . 186 </div> <div> <br> </div> <div> &nbsp; &nbsp; Clock Speed/Instructions per Cycle (IPC).. . . . . . . . . . . 187 </div> <div> <br> </div> <div> &nbsp; &nbsp; Hyperconverged.. . . . . . . . . . . . . . . . . . . . 188 </div> <div> <br> </div> <div> &nbsp; &nbsp; Memory. . . . . . . . . . . . . . . . . . . . . . . 188 </div> <div> <br> </div> <div> &nbsp; &nbsp; What Next?.. . . . . . . . . . . . . . . . . . . . . 191 </div> <div> <br> </div> <div> CHAPTER 15: Cloud Migrations.. . . . . . . . . . . . . . . . . . . . . 193 </div> <div> <br> </div> <div> &nbsp; &nbsp; Physical to Virtual (P2V).. . . . . . . . . . . . . . . . . 194 </div> <div> <br> </div> <div> &nbsp; &nbsp; Virtual to Virtual (V2V).. . . . . . . . . . . . . . . . . 195 </div> <div> <br> </div> <div> &nbsp; &nbsp; Cloud-to-Cloud Migrations.. . . . . . . . . . . . . . . . 196 </div> <div> <br> </div> <div> &nbsp; &nbsp; Storage Migrations.. . . . . . . . . . . . . . . . . . . 198 </div> <div> <br> </div> <div> &nbsp; &nbsp; Database Migrations.. . . . . . . . . . . . . . . . . . 200 </div> <div> <br> </div> <div> &nbsp; &nbsp; What Next?.. . . . . . . . . . . . . . . . . . . . . 203 </div> <div> <br> </div> <div> CHAPTER 16: Logging, Monitoring, and Alerting.. . . . . . . . . . . . . . . 205 </div> <div> <br> </div> <div> &nbsp; &nbsp; Logging. . . . . . . . . . . . . . . . . . . . . . . 206 </div> <div> <br> </div> <div> &nbsp; &nbsp; Monitoring.. . . . . . . . . . . . . . . . . . . . . 209 </div> <div> <br> </div> <div> &nbsp; &nbsp; Alerting.. . . . . . . . . . . . . . . . . . . . . . . 214 </div> <div> <br> </div> <div> &nbsp; &nbsp; What Next?.. . . . . . . . . . . . . . . . . . . . . 216 </div> <div> <br> </div> <div> CHAPTER 17: Operation of a Cloud Environment.. . . . . . . . . . . . . . . 217 </div> <div> <br> </div> <div> &nbsp; &nbsp; Confirm Completion of Backups. . . . . . . . . . . . . . 218 </div> <div> <br> </div> <div> &nbsp; &nbsp; Lifecycle Management. . . . . . . . . . . . . . . . . . 218 </div> <div> <br> </div> <div> &nbsp; &nbsp; Change Management. . . . . . . . . . . . . . . . . . 220 </div> <div> <br> </div> <div> &nbsp; &nbsp; Asset Management.. . . . . . . . . . . . . . . . . . . 220 </div> <div> <br> </div> <div> &nbsp; &nbsp; Patching.. . . . . . . . . . . . . . . . . . . . . . 221 </div> <div> <br> </div> <div> &nbsp; &nbsp; Impacts of Process Improvements on Systems. . . . . . . . . . 226 </div> <div> <br> </div> <div> &nbsp; &nbsp; Upgrade Methods.. . . . . . . . . . . . . . . . . . . 226 </div> <div> <br> </div> <div> &nbsp; &nbsp; Dashboard and Reporting.. . . . . . . . . . . . . . . . 228 </div> <div> <br> </div> <div> &nbsp; &nbsp; What Next?.. . . . . . . . . . . . . . . . . . . . . 234 </div> <div> <br> </div> <div> CHAPTER 18: Optimize Cloud Environments. . . . . . . . . . . . . . . . . 235 </div> <div> <br> </div> <div> &nbsp; &nbsp; Right-sizing.. . . . . . . . . . . . . . . . . . . . . 236 </div> <div> <br> </div> <div> &nbsp; &nbsp; Compute and Storage.. . . . . . . . . . . . . . . . . . 236 </div> <div> <br> </div> <div> &nbsp; &nbsp; Network.. . . . . . . . . . . . . . . . . . . . . . 237 </div> <div> <br> </div> <div> &nbsp; &nbsp; Placement.. . . . . . . . . . . . . . . . . . . . . . 242 </div> <div> <br> </div> <div> &nbsp; &nbsp; Geographical.. . . . . . . . . . . . . . . . . . . 242 </div> <div> <br> </div> <div> &nbsp; &nbsp; Device Drivers and Firmware.. . . . . . . . . . . . . . . 243 </div> <div> <br> </div> <div> &nbsp; &nbsp; What Next?.. . . . . . . . . . . . . . . . . . . . . 246 </div> <div> <br> </div> <div> CHAPTER 19: Automation and Orchestration Techniques.. . . . . . . . . . . . 247 </div> <div> <br> </div> <div> &nbsp; &nbsp; Infrastructure as Code (IaC).. . . . . . . . . . . . . . . . 248 </div> <div> <br> </div> <div> &nbsp; &nbsp; Continuous Integration/Continuous Deployment (CI/CD).. . . . . 249 </div> <div> <br> </div> <div> &nbsp; &nbsp; Version Control.. . . . . . . . . . . . . . . . . . . . 250 </div> <div> <br> </div> <div> &nbsp; &nbsp; Configuration Management.. . . . . . . . . . . . . . . . 251 </div> <div> <br> </div> <div> &nbsp; &nbsp; Containers.. . . . . . . . . . . . . . . . . . . . . . 252 </div> <div> <br> </div> <div> &nbsp; &nbsp; Automation Activities.. . . . . . . . . . . . . . . . . . 252 </div> <div> <br> </div> <div> &nbsp; &nbsp; Secure Scripting.. . . . . . . . . . . . . . . . . . . . 254 </div> <div> <br> </div> <div> &nbsp; &nbsp; Orchestration Sequencing.. . . . . . . . . . . . . . . . 255 </div> <div> <br> </div> <div> &nbsp; &nbsp; What Next?.. . . . . . . . . . . . . . . . . . . . . 257 </div> <div> <br> </div> <div> CHAPTER 20: Backup and Restore Operations.. . . . . . . . . . . . . . . . 259 </div> <div> <br> </div> <div> &nbsp; &nbsp; Backup Types.. . . . . . . . . . . . . . . . . . . . . 260 </div> <div> <br> </div> <div> &nbsp; &nbsp; Backup Objects. . . . . . . . . . . . . . . . . . . . 263 </div> <div> <br> </div> <div> &nbsp; &nbsp; Backup Targets.. . . . . . . . . . . . . . . . . . . . 265 </div> <div> <br> </div> <div> &nbsp; &nbsp; Backup and Restore Policies.. . . . . . . . . . . . . . . . 266 </div> <div> <br> </div> <div> &nbsp; &nbsp; Restoration Methods.. . . . . . . . . . . . . . . . . . 269 </div> <div> <br> </div> <div> &nbsp; &nbsp; What Next?.. . . . . . . . . . . . . . . . . . . . . 272 </div> <div> <br> </div> <div> CHAPTER 21: Disaster Recovery Tasks.. . . . . . . . . . . . . . . . . . 273 </div> <div> <br> </div> <div> &nbsp; &nbsp; Failovers.. . . . . . . . . . . . . . . . . . . . . . 274 </div> <div> <br> </div> <div> &nbsp; &nbsp; Failback.. . . . . . . . . . . . . . . . . . . . . . . 274 </div> <div> <br> </div> <div> &nbsp; &nbsp; Restore Backups.. . . . . . . . . . . . . . . . . . . . 275 </div> <div> <br> </div> <div> &nbsp; &nbsp; Replication. . . . . . . . . . . . . . . . . . . . . . 275 </div> <div> <br> </div> <div> &nbsp; &nbsp; On-Premises and Cloud Sites.. . . . . . . . . . . . . . . 275 </div> <div> <br> </div> <div> &nbsp; &nbsp; Requirements.. . . . . . . . . . . . . . . . . . . . . 277 </div> <div> <br> </div> <div> &nbsp; &nbsp; Documentation. . . . . . . . . . . . . . . . . . . . 277 </div> <div> <br> </div> <div> &nbsp; &nbsp; Geographical Data Center Requirements.. . . . . . . . . . . 279 </div> <div> <br> </div> <div> &nbsp; &nbsp; What Next?.. . . . . . . . . . . . . . . . . . . . . 280 </div> <div> <br> </div> <div> CHAPTER 22: Troubleshooting Methodology. . . . . . . . . . . . . . . . . 281 </div> <div> <br> </div> <div> &nbsp; &nbsp; Always Consider Corporate Policies, Procedures, and Impacts Before </div> <div> <br> </div> <div> &nbsp; &nbsp; Implementing Changes.. . . . . . . . . . . . . . . . . 282 </div> <div> <br> </div> <div> &nbsp; &nbsp; 1. Identify the Problem.. . . . . . . . . . . . . . . . . 283 </div> <div> <br> </div> <div> &nbsp; &nbsp; 2. Establish a Theory of Probable Cause (Question the Obvious).. . . 284 </div> <div> <br> </div> <div> &nbsp; &nbsp; 3. Test the Theory to Determine Cause.. . . . . . . . . . . . 285 </div> <div> <br> </div> <div> &nbsp; &nbsp; 4. Establish a Plan of Action to Resolve the Problem and Implement the Solution... 285 </div> <div> <br> </div> <div> &nbsp; &nbsp; 5. Verify Full System Functionality and, if Applicable, Implement Preventive Measures.. 286 </div> <div> <br> </div> <div> &nbsp; &nbsp; 6. Document the Findings, Actions, and Outcomes Throughout the Process.. . 286 </div> <div> <br> </div> <div> &nbsp; &nbsp; What Next?.. . . . . . . . . . . . . . . . . . . . . 288 </div> <div> <br> </div> <div> CHAPTER 23: Troubleshoot Security Issues.. . . . . . . . . . . . . . . . . 289 </div> <div> <br> </div> <div> &nbsp; &nbsp; Privilege.. . . . . . . . . . . . . . . . . . . . . . 290 </div> <div> <br> </div> <div> &nbsp; &nbsp; Authentication.. . . . . . . . . . . . . . . . . . . . 291 </div> <div> <br> </div> <div> &nbsp; &nbsp; Authorization.. . . . . . . . . . . . . . . . . . . . . 292 </div> <div> <br> </div> <div> &nbsp; &nbsp; Security Groups.. . . . . . . . . . . . . . . . . . . . 293 </div> <div> <br> </div> <div> &nbsp; &nbsp; Keys and Certificates. . . . . . . . . . . . . . . . . . 294 </div> <div> <br> </div> <div> &nbsp; &nbsp; Misconfigured or Misapplied Policies.. . . . . . . . . . . . 295 </div> <div> <br> </div> <div> &nbsp; &nbsp; Data Security Issues. . . . . . . . . . . . . . . . . . . 296 </div> <div> <br> </div> <div> &nbsp; &nbsp; Exposed Endpoints.. . . . . . . . . . . . . . . . . . . 297 </div> <div> <br> </div> <div> &nbsp; &nbsp; Misconfigured or Failed Security Appliances. . . . . . . . . . 298 </div> <div> <br> </div> <div> &nbsp; &nbsp; Unsupported Protocols.. . . . . . . . . . . . . . . . . 298 </div> <div> <br> </div> <div> &nbsp; &nbsp; External/Internal Attacks.. . . . . . . . . . . . . . . . . 298 </div> <div> <br> </div> <div> &nbsp; &nbsp; What Next?.. . . . . . . . . . . . . . . . . . . . . 300 </div> <div> <br> </div> <div> CHAPTER 24: Troubleshoot Deployment, Automation, and Orchestration Issues.. . . 301 </div> <div> <br> </div> <div> &nbsp; &nbsp; Connectivity Issues.. . . . . . . . . . . . . . . . . . . 302 </div> <div> <br> </div> <div> &nbsp; &nbsp; Performance Degradation.. . . . . . . . . . . . . . . . 304 </div> <div> <br> </div> <div> &nbsp; &nbsp; Configurations.. . . . . . . . . . . . . . . . . . . . 305 </div> <div> <br> </div> <div> &nbsp; &nbsp; Applications in Containers.. . . . . . . . . . . . . . . . 306 </div> <div> <br> </div> <div> &nbsp; &nbsp; Misconfigured Templates.. . . . . . . . . . . . . . . . . 306 </div> <div> <br> </div> <div> &nbsp; &nbsp; Missing or Incorrect Tags. . . . . . . . . . . . . . . . . 306 </div> <div> <br> </div> <div> &nbsp; &nbsp; Insufficient Capacity.. . . . . . . . . . . . . . . . . . 307 </div> <div> <br> </div> <div> &nbsp; &nbsp; Licensing Issues.. . . . . . . . . . . . . . . . . . . . 307 </div> <div> <br> </div> <div> &nbsp; &nbsp; Vendor-Related Issues.. . . . . . . . . . . . . . . . . . 308 </div> <div> <br> </div> <div> &nbsp; &nbsp; Account Mismatches.. . . . . . . . . . . . . . . . . . 310 </div> <div> <br> </div> <div> &nbsp; &nbsp; Change Management Failures. . . . . . . . . . . . . . . 310 </div> <div> <br> </div> <div> &nbsp; &nbsp; Server Name Changes.. . . . . . . . . . . . . . . . . . 311 </div> <div> <br> </div> <div> &nbsp; &nbsp; IP Address Changes. . . . . . . . . . . . . . . . . . . 311 </div> <div> <br> </div> <div> &nbsp; &nbsp; Location Changes.. . . . . . . . . . . . . . . . . . . 312 </div> <div> <br> </div> <div> &nbsp; &nbsp; Version/Feature Mismatch.. . . . . . . . . . . . . . . . 312 </div> <div> <br> </div> <div> &nbsp; &nbsp; Automation Tool Incompatibility. . . . . . . . . . . . . . 313 </div> <div> <br> </div> <div> &nbsp; &nbsp; Job Validation Issue.. . . . . . . . . . . . . . . . . . . 314 </div> <div> <br> </div> <div> &nbsp; &nbsp; Patching Failure.. . . . . . . . . . . . . . . . . . . . 315 </div> <div> <br> </div> <div> &nbsp; &nbsp; What Next?.. . . . . . . . . . . . . . . . . . . . . 316 </div> <div> <br> </div> <div> CHAPTER 25: Troubleshoot Connectivity Issues and Common Performance Issues.. . 317 </div> <div> <br> </div> <div> &nbsp; &nbsp; Network Security Group Misconfigurations.. . . . . . . . . . 318 </div> <div> <br> </div> <div> &nbsp; &nbsp; Common Networking Configuration Issues.. . . . . . . . . . 319 </div> <div> <br> </div> <div> &nbsp; &nbsp; Network Troubleshooting Tools.. . . . . . . . . . . . . . 324 </div> <div> <br> </div> <div> &nbsp; &nbsp; Resource Utilization.. . . . . . . . . . . . . . . . . . 336 </div> <div> <br> </div> <div> &nbsp; &nbsp; Application. . . . . . . . . . . . . . . . . . . . . . 337 </div> <div> <br> </div> <div> &nbsp; &nbsp; Incorrectly Configured or Failed Load Balancing.. . . . . . . . 338 </div> <div> <br> </div> <div> &nbsp; &nbsp; What Next?.. . . . . . . . . . . . . . . . . . . . . 339 </div> <div> <br> </div> <div> Glossary of Essential Terms and Components.. . . . . . . . . . . 341 </div> <div> <br> </div> <div> <br> </div> <div> <br> </div> <div> 9780137393251, TOC, 10/21/2021 </div> <div> <br> </div> <div> <br> </div>

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        CompTIA Cloud+ CV0-003 Exam Cram