Use this quick start guide to collect all the information about CompTIA Cloud+ (CV0-002) Certification exam. This study guide provides a list of objectives and resources that will help you prepare for items on the CV0-002 CompTIA Cloud+ exam. The Sample Questions will help you identify the type and difficulty level of the questions and the Practice Exams will make you familiar with the format and environment of an exam. You should refer this guide carefully before attempting your actual CompTIA Cloud Plus certification exam.
The CompTIA Cloud+ certification is mainly targeted to those candidates who want to build their career in Cloud Computing domain. The CompTIA Cloud+ exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of CompTIA Cloud Plus.
CompTIA Cloud+ Exam Summary:
Exam Name | CompTIA Cloud+ |
Exam Code | CV0-002 |
Exam Price | $338 (USD) |
Duration | 90 mins |
Number of Questions | 90 |
Passing Score | 750 / 900 |
Schedule Exam | Pearson VUE |
Sample Questions | CompTIA Cloud+ Sample Questions |
Practice Exam | CompTIA CV0-002 Certification Practice Exam |
CompTIA CV0-002 Exam Syllabus Topics:
Topic | Details |
---|---|
Configuration and Deployment - 24% |
|
Given a scenario, analyze system requirements to ensure successful system deployment.
|
1. Appropriate commands, structure, tools, and automation/orchestration as needed 2. Platforms and applications 3. Interaction of cloud components and services
4. Interaction of non-cloud components and services |
Given a scenario, execute a provided deployment plan. |
1. Apply the change management process
2. Refer to documentation and follow standard operating procedures
3. Execute workflow 4. Configure automation and orchestration, where appropriate, for the system being deployed 5. Use commands and tools as needed 6. Document results |
Given a scenario, analyze system requirements to determine if a given testing plan is appropriate.
|
1. Underlying environmental considerations included in the testing plan
2. Testing techniques
|
Given a scenario, analyze testing results to determine if the testing was successful in relation to given system requirements.
|
1. Consider success factor indicators of the testing environment
2. Document results
3. Baseline comparisons 4. SLA comparisons 5. Cloud performance fluctuation variables |
Given a scenario, analyze sizing, subnetting, and basic routing for a provided deployment of the virtual network.
|
1. Cloud deployment models
2. Network components
5. Determine if cloud resources are consistent with the SLA and/or change management requirements
|
Given a scenario, analyze CPU and memory sizing for a provided deployment.
|
1. Available vs. proposed resources
2. Memory technologies
3. CPU technologies
4. Effect to HA/DR
8. Dedicated compute environment vs. shared compute environment
|
Given a scenario, analyze the appropriate storage type and protection capability for a provided deployment.
|
1. Requested IOPS and read/ write throughput 2. Protection capabilities
3. Storage types
4. Access protocols
5. Management differences 6. Provisioning model
7. Storage technologies
8. Storage tiers
9. Overcommitting storage 10. Security configurations for applicable platforms
|
Given a scenario, analyze characteristics of the workload (storage, network, compute) to ensure a successful migration.
|
1. Migration types
2. Source and destination format of the workload
3. Network connections and data transfer methodologies
|
Given a scenario, apply elements required to extend the infrastructure into a given cloud solution.
|
1. Identity management elements
2. Appropriate protocols given requirements
3. Element considerations to deploy infrastructure services such as:
|
Security - 16% |
|
Given a scenario, apply security configurations and compliance controls to meet given cloud infrastructure requirements.
|
1. Company security policies 2. Apply security standards for the selected platform 3. Compliance and audit requirements governing the environment
4. Encryption technologies
5. Key and certificate management
6. Tunneling protocols
7. Implement automation and orchestration processes as applicable
8. Appropriate configuration for the applicable platform as it applies to compute
|
Given a scenario, apply the appropriate ACL to the target objects to meet access requirements according to a security template.
|
1. Authorization to objects in the cloud
2. Effect of cloud service models on security implementations
3. Effect of cloud deployment models on security implementations 4. Access control methods
|
Given a cloud service model, implement defined security technologies to meet given security requirements.
|
1. Data classification 2. Concepts of segmentation and microsegmentation
3. Use encryption as defined
4. Use multifactor authentication as defined 5. Apply defined audit/ compliance requirements |
Given a cloud service model, apply the appropriate security automation technique to the target system.
|
1. Tools
2. Techniques
3. Security services
4. Impact of security tools to systems and services
5. Impact of security automation techniques as they relate to the criticality of systems
|
Maintenance - 18% |
|
Given a cloud service model, determine the appropriate methodology to apply given patches.
|
1. Scope of cloud elements to be patched
2. Patching methodologies and standard operating procedures
3. Use order of operations as it pertains to elements that will be patched
4. Dependency considerations |
Given a scenario, apply the appropriate automation tools to update cloud elements.
|
1. Types of updates
2. Automation workflow
3. Activities to be performed by automation tools
|
Given a scenario, apply an appropriate backup or restore method. |
1. Backup types
2. Backup target
3. Other considerations
|
Given a cloud-based scenario, apply appropriate disaster recovery methods.
|
1. DR capabilities of a cloud service provider 2. Other considerations
|
Given a cloud-based scenario, apply the appropriate steps to ensure business continuity.
|
1. Business continuity plan
2. SLAs for BCP and HA
|
Given a scenario, apply the appropriate maintenance automation technique to the target objects.
|
1. Maintenance schedules 2. Impact and scope of maintenance tasks 3. Impact and scope of maintenance automation techniques 4. Include orchestration as appropriate 5. Maintenance automation tasks
|
Management - 20% |
|
Given a scenario, analyze defined metrics to determine the presence of an abnormality and/or forecast future needed cloud resources.
|
1. Monitoring
2. Event correlation
3. Forecasting resource capacity
4. Policies in support of event collection
Policies to communicate alerts appropriately
|
Given a scenario, determine the appropriate allocation of cloud resources.
|
1. Resources needed based on cloud deployment models
2. Capacity/elasticity of cloud environment
3. Support agreements
4. Configuration management tool
5. Resource balancing techniques 6. Change management
|
Given a scenario, determine when to provision/deprovision cloud resources.
|
1. Usage patterns 2. Cloud bursting
3. Cloud provider migrations
4. Extending cloud scope 5. Application life cycle
6. Business need change
|
Given a scenario, implement account provisioning techniques in a cloud environment to meet security and policy requirements.
|
1. Identification 2. Authentication methods
3. Authorization methods
4. Account life cycle
5. Account management policy
6. Automation and orchestration activities
|
Given a scenario, analyze deployment results to confirm they meet the baseline.
|
1. Procedures to confirm results
|
Given a specific environment and related data (e.g., performance, capacity, trends), apply appropriate changes to meet expected criteria.
|
1. Analyze performance trends 2. Refer to baselines 3. Refer to SLAs 4. Tuning of cloud target objects
5. Recommend changes to meet expected performance/capacity
|
Given SLA requirements, determine the appropriate metrics to report. |
1. Chargeback/showback models
2. Dashboard and reporting
|
Troubleshooting - 22% |
|
Given a scenario, troubleshoot a deployment issue. |
1. Common issues in the deployments
|
Given a scenario, troubleshoot common capacity issues.
|
1. Exceeded cloud capacity boundaries
2. Deviation from original baseline
3. Unplanned expansions |
Given a scenario, troubleshoot automation/orchestration issues. |
1. Breakdowns in the workflow
|
Given a scenario, troubleshoot connectivity issues. |
1. Common networking issues
2. Network tool outputs
3. Network connectivity tools
4. Remote access tools for troubleshooting
|
Given a scenario, troubleshoot security issues. |
1. Authentication issues
2. Authorization issues
3. Federation and single sign-on issues 4. Certificate expiration 5. Certification misconfiguration 6. External attacks 7. Internal attacks 8. Privilege escalation 9. Internal role change 10. External role change 11. Security device failure 12. Incorrect hardening settings 13. Unencrypted communication 14. Unauthorized physical access 15. Unencrypted data 16. Weak or obsolete security technologies 17. Insufficient security controls and processes 18. Tunneling or encryption issues |
Given a scenario, explain the troubleshooting methodology. |
Always consider corporate policies, procedures and impacts before implementing changes 1. Identify the problem
2. Establish a theory of probable cause (question the obvious)
3. Test the theory to determine cause
4. Establish a plan of action to resolve the problem and implement the solution
5. Verify full system functionality and, if applicable, implement preventive measures
6. Document findings, actions and outcomes
|
To ensure success in CompTIA Cloud Plus certification exam, we recommend authorized training course, practice test and hands-on experience to prepare for CompTIA Cloud+ (CV0-002) exam.