CompTIA Cloud+ (Cloud Plus) Exam Syllabus

Cloud+ PDF, CV0-001 Dumps, CV0-001 PDF, Cloud+ VCE, CV0-001 Questions PDF, CompTIA CV0-001 VCE, CompTIA Cloud Plus Dumps, CompTIA Cloud Plus PDFUse this quick start guide to collect all the information about CompTIA Cloud+ (CV0-001) Certification exam. This study guide provides a list of objectives and resources that will help you prepare for items on the CV0-001 Cloud+ exam. The Sample Questions will help you identify the type and difficulty level of the questions and the Practice Exams will make you familiar with the format and environment of an exam. You should refer this guide carefully before attempting your actual CompTIA Cloud Plus certification exam.

The CompTIA Cloud+ certification is mainly targeted to those candidates who want to build their career in Cloud Computing domain. The CompTIA Cloud+ exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of CompTIA Cloud Plus.

CompTIA Cloud+ Exam Summary:

Exam Name CompTIA Cloud+
Exam Code CV0-001
Exam Price $302 (USD)
Duration 90 mins
Number of Questions 100
Passing Score 750 / 900
Books / Training CompTIA Cloud+ CV0-001
Schedule Exam CompTIA Marketplace
Sample Questions CompTIA Cloud+ Sample Questions
Practice Exam CompTIA CV0-001 Certification Practice Exam
 

CompTIA CV0-001 Exam Syllabus Topics:

Topic Details
Cloud Concepts and Models 12%
Compare and contrast cloud services. 1. SaaS (according to NIST)
2. IaaS (according to NIST)
3. PaaS (according to NIST)
4. CaaS
5. XaaS
6. DaaS
7. BPaaS
8. Accountability and responsibility based on service models
Compare and contrast cloud delivery models and services.
1. Private
2. Public
3. Hybrid
4. Community
5. On-premise vs. off-premise hosting
6. Accountability and responsibility based on delivery models
7. Security differences between models
  1. Multi-tenancy issues
  2. Data segregation
  3. Network isolation
  4. Check laws and regulations

8. Functionality and performance validation based on chosen delivery model
9. Orchestration platforms

Summarize cloud characteristics and terms. 1. Elasticity
2. On-demand self-service/just-in-time service
3. Pay-as-you-grow
4. Chargeback
5. Ubiquitous access
6. Metering resource pooling
7. Multi-tenancy
8. Cloud bursting
9. Rapid deployment
10. Automation
Explain object storage concepts. 1. Object ID
2. Metadata
3. Data/blob
4. Extended metadata
5. Policies
6. Replicas
7. Access control
Virtualization 19%
Explain the differences between hypervisor types.
1. Type I and Type II
  1. Bare metal vs. OS dependent
  2. Performance and overhead considerations
  3. Hypervisor-specific system requirements
2. Proprietary vs. open source
3. Consumer vs. enterprise use
  1. Workstation vs. infrastructure
Install, configure and manage virtual machines and devices. 1. Creating, importing and exporting template and virtual machines
2. Install guest tools
  1. Drives
  2. Management tools

3. Snapshots and cloning
4. Image backups vs. file backups
5. Virtual NIC

  1. Virtual network
  2. IP address
  3. Default gateway
  4. Netmask
  5. Bridging
6. Virtual disks
  1. Limits
  2. SCSI/ATA ID
7. Virtual switches
  1. VLAN
  2. Interface configuration
8.VLAN
  1. Assign IDs
  2. Bind interfaces
9. VSAN
  1. Assign IDs
Given a scenario, perform virtual resource migration. 1. Establish requirements
2. Maintenance scheduling
3. Reasons
  1. Performance issues
  2. Testing
  3. Upgrading
  4. Utilization

4. Storage migration

  1. Virtual vs. physical
5. Online vs. offline migrations
6. Physical to Virtual (P2V)
7. Virtual to Virtual (V2V)
8. Virtual to Physical (V2P)
Explain the benefits of virtualization in a cloud environment. 1. Shared resources
2. Elasticity
  1. Time to service/mean time to implement
  2. Resource pooling
  3. Scalable
  4. Available
  5. Portable
3. Network and application isolation
4. Infrastructure consolidation
5. Virtual datacenter creation
Compare and contrast virtual components used to construct
a cloud environment.
1. Virtual network components
  1. Virtual NIC
  2. Virtual HBA
  3. Virtual router
2. Shared memory
3. Virtual CPU
4. Storage virtualization
  1. Shared storage
  2. Clustered storage
  3. NPIV
Infrastructure 21%
Compare and contrast various storage technologies.
1. Network Attached Storage (NAS)
  1. File level access
  2. Shared storage

2. Direct Attached Storage (DAS)

  1. Block level access
  2. Dedicated storage

3. Storage Area Network (SAN)

  1. Block level access
  2. Shared storage
  3. HBAs
  4. LUN masking
  5. Zoning
  6. WWN
  7. Fibre Channel protocols
4. Different access protocols
  1. FCoE
  2. FC
  3. Ethernet
  4. iSCSI
5. Protocols and applications
  1. IP
  2. FCP
  3. iSCSI
6. Management differences
Explain storage configuration concepts. 1. Disk types
  1. SSD vs. spinning
  2. Interfaces types
  3. Access speed
2. Tiering
  1. Performance levels of each tier
  2. Policies
3. RAID levels
  1. RAID 1
  2. RAID 0
  3. RAID 1+0
  4. RAID 0+1
  5. RAID 5
  6. RAID 6
4. File system types
  1. UFS
  2. EXT
  3. NTFS
  4. FAT
  5. VMFS
  6. ZFS
Execute storage provisioning. 1. Creating LUNs
2. Creating network shares
3. Zoning and LUN masking
4. Multipathing
5. Implications of adding capacity to a NAS and SAN
  1. Impact to operations
  2. Downtime
  3. Best practices
Given a scenario, implement appropriate network configurations. 1. NAT
2. PAT
3. Subnetting/supernetting
4. VLAN and VLAN tagging
5. Network port configurations
6. Switching and routing in physical and virtual environments
  1. Routing tables
Explain the importance of network optimization. 1. WAN
2. LAN
3. MAN
4. QoS
5. Bandwidth
6. Latency
7. Compression
8. Caching
9. Load balancing
10. Devices on the same subnet
Given a scenario, troubleshoot basic network connectivity issues. 1. Tools
ping
  1. tracert/traceroute
  2. telnet
  3. netstat
  4. nslookup/dig
  5. ipconfig/ifconfig
  6. route
  7. arp

2. Review documentation and device configuration settings
3. Review system logs

Explain common network protocols, ports and topologies. 1. Trunk ports
2. Port binding/aggregation
3. Common ports
  1. 80
  2. 21
  3. 22
  4. 25
  5. 53
  6. 443
  7. 68

4. Common protocols

  1. HTTP
  2. FTP
  3. HTTPS
  4. FTPS
  5. SFTP
  6. SSH
  7. DNS
  8. DHCP
  9. SMTP

5. Types of networks

  1. Intranet
  2. Extranet
  3. Internet
Explain common hardware resources and features used to enable
virtual environments.
1. BIOS/firmware configurations
2. Minimum memory capacity and configuration
3. Number of CPUs
4. Number of cores
5. NICs quantity, speeds and configurations
6. Internal hardware compatibility
7. HBAs
8. Storage media
  1. Tape
  2. SSD
  3. USB
  4. Disk
Resource Management 13%
Given a scenario, implement and use proper resource
monitoring techniques.
1. Protocols
  1. SNMP
  2. WMI
  3. IPMI
  4. Syslog service

2. Alert methods

  1. SMTP
  2. SMS
  3. SNMP
  4. Web services
  5. Syslog

3. Establish baselines and thresholds
4. Automated responses to specific events
5. Examine processes usage/resource usage

Given a scenario, appropriately allocate physical (host)
resources using best practices.
1. Memory
2. CPU
3. Storage and network allocation
4. Entitlement/quotas (shares)
  1. Hard limit 
  2. Soft limit
5. Reservations
6. Licensing
7. Resource pooling
Given a scenario, appropriately allocate virtual (guest)
resources using best practices.
1. Virtual CPU
2. Memory
3. Storage and network allocation
4. Entitlement/quotas (shares)
5. Hard limit/soft limit
6. Reservations/licensing
7. Dynamic resource allocation
8. Resource pooling
9. CPU affinity
10. Physical resource redirection and mapping to virtual resources
  1. Serial
  2. USB
  3. Parallel port mapping
Given a scenario, use appropriate tools for remote access. 1. Remote hypervisor access
2. RDP
3. SSH
4. Console port
5. HTTP
Security 16%
Explain network security concepts, tools and best practices. 1. ACLs
2. VPNs
3. IDS/IPS hardware/software-based firewalls
4. DMZ
5. Review/audit logs
6. Attacks
  1. DDoS
  2. Ping of death
  3. Ping flood
Explain storage security concepts, methods and best practices. 1. Obfuscation
2. Access control lists
3. Zoning
4. LUN masking
5. User and host authentication
6. Review/audit logs
Compare and contrast different encryption technologies and methods.
1. PKI
2. IPSec
3. SSL/TLS
4. Ciphers
  1. AES
  2. 3DES
  3. RSA
  4. DSA
  5. RC4
  6. RC5

5. Encryption for data in transit and encryption for data at rest

Identify access control methods. 1. Role-based administration
2. Mandatory access controls
3. Discretionary access controls
4. Multifactor authentication
5. Single sign-on
6. Federation
Implement guest and host hardening techniques. 1. Disabling unneeded ports and services
2. User credentials
  1. Changing default passwords
3. Host-based/software firewalls
4. Antivirus software
5. Patching
6. Deactivating default accounts
Systems Management 11%
Explain policies and procedures as they relate to a cloud environment. 1. Network and IP planning/documentation
2. Configuration standardization and documentation
3. Change management best practices
  1. Documentation
  2. Configuration control
  3. Asset accountability
  4. Approval process
  5. Backout plan
4. Configuration management
  1. CMDB
  2. Approval process
  3. Configuration control
5. Capacity management
  1. Monitoring for changes
  2. Trending
6. Systems life cycle management
7. Maintenance windows
  1. Server upgrades and patches
Given a scenario, diagnose, remediate and optimize physical
 host performance.
1. Disk performance
2. Disk tuning
3. Disk latency
4. Swap disk space
5. I/O tuning
6. Performance management and monitoring tools
7. Establish baseline and create documentation with appropriate tools
8. Hypervisor configuration best practices
  1. Memory ballooning
  2. I/O throttling
  3. CPU wait time
9. Impact of configuration changes to the virtual environment
10. Common issues
  1. Disk failure
  2. HBA failure
  3. Memory failure
  4. NIC failure
  5. CPU failure
Explain common performance concepts as they relate to the
host and the guest.
1. IOPS
2. Read vs. write files
3. File system performance
4. Metadata performance
5. Caching
6. Bandwidth
7. Throughput (bonding/teaming)
8. Jumbo frames
9. Network latency
10. Hop counts
11. QoS
12. Multipathing
13. Load balancing
14. Scaling
  1. Vertical vs. horizontal vs. diagonal
Implement appropriate testing techniques when deploying cloud services.
1. Test replication
2. Test latency
3. Test bandwidth
4. Test load balancing
5. Test application servers
6. Test storage
7. Test application delivery
8. Service performance testing and application performance testing
9. Penetration testing
10. Vulnerability assessment
11. Separation of duties during testing
Business Continuity in the Cloud 8%
Compare and contrast disaster recovery methods and concepts. 1. Redundancy
2. Failover
3. Geographical diversity
4. Failback
5. Replication
6. Site mirroring
7. Hot site
8. Cold site
9. Warm site
10. Backup and recovery
11. Archiving and off-site storage
12. Replication types
  1. Synchronous
  2. Asynchronous

13. RTO
14. RPO
15. MTBF
16. MTTR
17. Mission-critical requirements

Deploy solutions to meet availability requirements.
1. Fault tolerance
  1. High availability
  2. Local clustering/geoclustering
  3. Non-high-availability resources

2. Multipathing
3. Load balancing

To ensure success in CompTIA Cloud Plus certification exam, we recommend authorized training course, practice test and hands-on experience to prepare for Cloud+ (CV0-001) exam.

Rating: 5 / 5 (16 votes)