CompTIA Cloud+ Study Guide. Ben Piper
Читать онлайн книгу.1.18 Asynchronous replicationFIGURE 1.19 Load balancing web serversFIGURE 1.20 Cloud regionsFIGURE 1.21 Availability zonesFIGURE 1.22 Local computer running the hypervisor management applicationFIGURE 1.23 Remote hypervisor management applicationFIGURE 1.24 Local computer running Remote Desktop Services to remotely acces...FIGURE 1.25 Secure Shell encrypted remote access
2 Chapter 2FIGURE 2.1 Managing your cloud deploymentFIGURE 2.2 The FCAPS management umbrellaFIGURE 2.3 Public cloudFIGURE 2.4 Private cloudFIGURE 2.5 Hybrid cloudFIGURE 2.6 Community cloudFIGURE 2.7 A VPN creates a secure tunnel over an insecure network such as th...FIGURE 2.8 Intrusion detection systems monitor incoming network traffic for ...FIGURE 2.9 Intrusion prevention systems monitor activity and prevent network...FIGURE 2.10 DMZ servers are accessed by the outside world via the Internet a...FIGURE 2.11 Network-attached storageFIGURE 2.12 Direct-attached storageFIGURE 2.13 Storage area networkFIGURE 2.14 RAID level 0FIGURE 2.15 RAID level 1FIGURE 2.16 RAID level 1+0FIGURE 2.17 RAID level 0+1FIGURE 2.18 RAID level 5FIGURE 2.19 RAID level 6FIGURE 2.20 Zoning filters access to storage resources on the SAN switching ...FIGURE 2.21 LUN masking filters initiator access to storage volumes on the s...FIGURE 2.22 Physical-to-virtual migrationFIGURE 2.23 Virtual-to-virtual migrationFIGURE 2.24 Virtual-to-physical migrationFIGURE 2.25 Storage migrationFIGURE 2.26 Load-balancing web serversFIGURE 2.27 Network firewall for securityFIGURE 2.28 Firewalls define what traffic is allowed in and out of the netwo...
3 Chapter 3FIGURE 3.1 IPsec tunnel from remote site to cloud data centerFIGURE 3.2 IaaS security modelFIGURE 3.3 PaaS security modelFIGURE 3.4 SaaS security model
4 Chapter 4FIGURE 4.1 Multifactor authentication login screenFIGURE 4.2 Hardware-based multifactor authentication tokenFIGURE 4.3 Smartphone-based multifactor authentication tokenFIGURE 4.4 Dashboard applications show cloud health reports using a browser....FIGURE 4.5 Firewalls define what traffic is allowed in and out of the networ...
5 Chapter 5FIGURE 5.1 Rolling updates are performed sequentially.FIGURE 5.2 Blue-green deploymentFIGURE 5.3 Cluster updates on each server with no downtimeFIGURE 5.4 Virtual machine snapshotFIGURE 5.5 Virtual machine cloningFIGURE 5.6 Image backupFIGURE 5.7 File backupFIGURE 5.8 Local backupFIGURE 5.9 Remote backup
6 Chapter 6FIGURE 6.1 Hot site mirroringFIGURE 6.2 Warm siteFIGURE 6.3 Cold siteFIGURE 6.4 Site-to-site replication of dataFIGURE 6.5 Synchronous replicationFIGURE 6.6 Asynchronous replication
7 Chapter 7FIGURE 7.1 Basic network management topologyFIGURE 7.2 Cloud notification systemFIGURE 7.3 Vertical scalingFIGURE 7.4 Horizontal scaling
8 Chapter 8FIGURE 8.1 Cloud object trackingFIGURE 8.2 CPU usage reportingFIGURE 8.3 Collecting trending dataFIGURE 8.4 Vertical scalingFIGURE 8.5 Horizontal scalingFIGURE 8.6 Cloud reporting
9 Chapter 10FIGURE 10.1 Latency is an end-to-end network delay.FIGURE 10.2 Console port accessFIGURE 10.3 Console port accessFIGURE 10.4 Local computer running the RDP application to remotely access a ...FIGURE 10.5 Secure Shell–encrypted remote accessFIGURE 10.6 Account privilege escalationFIGURE 10.7 Top-down troubleshooting approachFIGURE 10.8 Bottom-up troubleshooting approachFIGURE 10.9 Divide-and-conquer troubleshooting approach
Guide
Pages
1 i
2 v
3 vi
4 vii
5 ix
6 xi
7 xxiii
8 xxiv
9 xxv
10 xxvi
11 xxvii
12 xxviii
13 xxix
14 xxx
15 xxxi
16 xxxii
17 xxxiii
18 xxxiv
19 xxxv
20 xxxvi
21 xxxvii
22 xxxviii
23 xxxix
24 xl
25 xli
26 xlii
27 xliii
28 xliv
29 xlv
30 xlvi
31 xlvii
32 xlviii
33 xlix
34