CompTIA Cloud+ Study Guide. Ben Piper

Чтение книги онлайн.

Читать онлайн книгу CompTIA Cloud+ Study Guide - Ben Piper страница 12

CompTIA Cloud+ Study Guide - Ben Piper

Скачать книгу

the factors that contribute to capacity planning.RequirementsHardwareSoftwareBudgetaryBusiness needs analysisStandard templatesLicensingPer-userSocket-basedVolume-basedCore-basedSubscriptionUser densitySystem loadTrend analysisBaselinesPatternsAnomaliesPerformance capacity planning 2, 8, 9 1.3 Explain the importance of high availability and scaling in cloud environments.HypervisorsAffinityAnti-affinityOversubscriptionComputeNetworkStorageRegions and zonesApplicationsContainersClustersHigh availability of network functionsSwitchesRoutersLoad balancersFirewallsAvoid single points of failureScalabilityAuto-scalingHorizontal scalingVertical scalingCloud bursting 1, 2, 5, 7 1.4 Given a scenario, analyze the solution design in support of the business requirements.Requirement analysisSoftwareHardwareIntegrationBudgetaryComplianceService-level agreement (SLA)User and business needsSecurityNetwork requirementsSizingSubnettingRoutingEnvironmentsDevelopmentQuality assurance (QA)StagingBlue-greenProductionDisaster recovery (DR)Testing techniquesVulnerability testingPenetration testingPerformance testingRegression testingFunctional testingUsability testing 1, 2, 5, 8

Chapters
2.1 Given a scenario, configure identity and access management.Identification and authorizationPrivileged access managementLogical access managementAccount life-cycle managementProvision and deprovision accountsAccess controlsRole-basedDiscretionaryNon-discretionaryMandatoryDirectory servicesLightweight directory access protocol (LDAP)FederationCertificate managementMultifactor authentication (MFA)Single sign-on (SSO)Security assertion markup language (SAML)Public key infrastructure (PKI)Secret managementKey management 2, 3, 4
2, 3
2, 3, 4, 5, 7
2.4 Given a scenario, apply data security and compliance controls in cloud environments.EncryptionIntegrityHashing algorithmsDigital signaturesFile integrity monitoring (FIM)ClassificationSegmentationAccess controlImpact of laws and regulationsLegal holdRecords managementVersioningRetentionDestructionWrite once read manyData loss prevention (DLP)Cloud access security broker (CASB) 3, 4, 5
3
2.6 Explain the importance of incident response procedures.PreparationDocumentationCall treesTrainingTabletopsDocumented incident types/categoriesRoles and responsibilitiesIncident response proceduresIdentificationScopeInvestigationContainment, eradication, and recoveryIsolationEvidence acquisitionChain of custodyPost-incident and lessons learnedRoot cause analysis

Exam Objective Chapters
1, 2, 7, 8