Читать книгу CompTIA Cloud+ Study Guide - Ben Piper, David Higby Clinton - Страница 4

List of Illustrations

Оглавление

1 Chapter 1FIGURE 1.1 In-house computingFIGURE 1.2 Cloud computing modelFIGURE 1.3 Mainframe computingFIGURE 1.4 Client-server computingFIGURE 1.5 Virtualized computingFIGURE 1.6 Cloud computingFIGURE 1.7 SaaSFIGURE 1.8 IaaSFIGURE 1.9 PaaSFIGURE 1.10 Public cloudFIGURE 1.11 Private cloudFIGURE 1.12 Community cloudFIGURE 1.13 Hybrid cloudFIGURE 1.14 Shared resource poolingFIGURE 1.15 Remote VPN access to a data centerFIGURE 1.16 Site-to-site replication of dataFIGURE 1.17 Synchronous replicationFIGURE 1.18 Asynchronous replicationFIGURE 1.19 Load balancing web serversFIGURE 1.20 Cloud regionsFIGURE 1.21 Availability zonesFIGURE 1.22 Local computer running the hypervisor management applicationFIGURE 1.23 Remote hypervisor management applicationFIGURE 1.24 Local computer running Remote Desktop Services to remotely acces...FIGURE 1.25 Secure Shell encrypted remote access

2 Chapter 2FIGURE 2.1 Managing your cloud deploymentFIGURE 2.2 The FCAPS management umbrellaFIGURE 2.3 Public cloudFIGURE 2.4 Private cloudFIGURE 2.5 Hybrid cloudFIGURE 2.6 Community cloudFIGURE 2.7 A VPN creates a secure tunnel over an insecure network such as th...FIGURE 2.8 Intrusion detection systems monitor incoming network traffic for ...FIGURE 2.9 Intrusion prevention systems monitor activity and prevent network...FIGURE 2.10 DMZ servers are accessed by the outside world via the Internet a...FIGURE 2.11 Network-attached storageFIGURE 2.12 Direct-attached storageFIGURE 2.13 Storage area networkFIGURE 2.14 RAID level 0FIGURE 2.15 RAID level 1FIGURE 2.16 RAID level 1+0FIGURE 2.17 RAID level 0+1FIGURE 2.18 RAID level 5FIGURE 2.19 RAID level 6FIGURE 2.20 Zoning filters access to storage resources on the SAN switching ...FIGURE 2.21 LUN masking filters initiator access to storage volumes on the s...FIGURE 2.22 Physical-to-virtual migrationFIGURE 2.23 Virtual-to-virtual migrationFIGURE 2.24 Virtual-to-physical migrationFIGURE 2.25 Storage migrationFIGURE 2.26 Load-balancing web serversFIGURE 2.27 Network firewall for securityFIGURE 2.28 Firewalls define what traffic is allowed in and out of the netwo...

3 Chapter 3FIGURE 3.1 IPsec tunnel from remote site to cloud data centerFIGURE 3.2 IaaS security modelFIGURE 3.3 PaaS security modelFIGURE 3.4 SaaS security model

4 Chapter 4FIGURE 4.1 Multifactor authentication login screenFIGURE 4.2 Hardware-based multifactor authentication tokenFIGURE 4.3 Smartphone-based multifactor authentication tokenFIGURE 4.4 Dashboard applications show cloud health reports using a browser....FIGURE 4.5 Firewalls define what traffic is allowed in and out of the networ...

5 Chapter 5FIGURE 5.1 Rolling updates are performed sequentially.FIGURE 5.2 Blue-green deploymentFIGURE 5.3 Cluster updates on each server with no downtimeFIGURE 5.4 Virtual machine snapshotFIGURE 5.5 Virtual machine cloningFIGURE 5.6 Image backupFIGURE 5.7 File backupFIGURE 5.8 Local backupFIGURE 5.9 Remote backup

6 Chapter 6FIGURE 6.1 Hot site mirroringFIGURE 6.2 Warm siteFIGURE 6.3 Cold siteFIGURE 6.4 Site-to-site replication of dataFIGURE 6.5 Synchronous replicationFIGURE 6.6 Asynchronous replication

7 Chapter 7FIGURE 7.1 Basic network management topologyFIGURE 7.2 Cloud notification systemFIGURE 7.3 Vertical scalingFIGURE 7.4 Horizontal scaling

8 Chapter 8FIGURE 8.1 Cloud object trackingFIGURE 8.2 CPU usage reportingFIGURE 8.3 Collecting trending dataFIGURE 8.4 Vertical scalingFIGURE 8.5 Horizontal scalingFIGURE 8.6 Cloud reporting

9 Chapter 10FIGURE 10.1 Latency is an end-to-end network delay.FIGURE 10.2 Console port accessFIGURE 10.3 Console port accessFIGURE 10.4 Local computer running the RDP application to remotely access a ...FIGURE 10.5 Secure Shell–encrypted remote accessFIGURE 10.6 Account privilege escalationFIGURE 10.7 Top-down troubleshooting approachFIGURE 10.8 Bottom-up troubleshooting approachFIGURE 10.9 Divide-and-conquer troubleshooting approach

CompTIA Cloud+ Study Guide

Подняться наверх