CompTIA Cloud+ (CV0-004) glossary
Terms selected for CompTIA Cloud+ (CV0-004) based on common objective language and practice focus.
Hybrid Cloud
Hybrid cloud combines public and private clouds, allowing data and applications to be shared between them for greater flexibility and deployment options.
Read full term ->IaaS
Infrastructure as a Service offering virtualized compute, storage, and networking.
Read full term ->PaaS
Platform as a Service model providing managed runtime and development stack.
Read full term ->Private Cloud
A private cloud is a cloud computing environment dedicated to a single organization, providing greater control and security over resources.
Read full term ->Public Cloud
A public cloud is a cloud computing model where services are offered over the public internet and shared across multiple organizations.
Read full term ->SaaS
Software as a Service where applications are accessed over the internet.
Read full term ->Virtual Machine
Software-defined computer running as an isolated guest system.
Read full term ->Virtualization
The creation of a virtual version of something, such as an operating system, a server, a storage device, or network resources.
Read full term ->Ansible
Automation platform used for configuration management and orchestration.
Read full term ->Autoscaling
A feature that automatically adjusts the number of compute resources based on current demand.
Read full term ->Availability Zone (AZ)
One or more discrete data centers in a Region with independent power, cooling, and networking.
Read full term ->Backup and Recovery
Backup and recovery strategies ensure that data is protected and can be restored in the event of data loss or corruption.
Read full term ->Billing Management
Billing management in cloud computing involves tracking and optimizing costs associated with cloud resource usage.
Read full term ->Block Storage
Storage model exposing raw blocks to systems, often used for VM disks and databases.
Read full term ->Cloud Access Security Broker (CASB)
A CASB is a security policy enforcement point positioned between cloud service consumers and providers to apply enterprise security policies as cloud-based resources are accessed.
Read full term ->CI/CD Pipelines
CI/CD pipelines automate the integration and deployment of code changes, facilitating continuous delivery of software updates.
Read full term ->Cloud Bursting
Pattern where workloads run on-premises but temporarily extend into public cloud under peak demand.
Read full term ->Cloud Networking
Cloud networking involves deploying and managing network resources in a cloud environment to ensure connectivity and security.
Read full term ->Cloud Orchestration
Coordinated automation of multi-step cloud operations and resource lifecycles.
Read full term ->Cold Site
Disaster recovery facility with minimal pre-installed systems requiring setup before use.
Read full term ->Compliance Standards
Compliance standards in cloud computing refer to the adherence to regulatory and industry standards such as PCI DSS, SOC 2, and ISO 27001.
Read full term ->Container Image
Packaged filesystem and runtime instructions used to create containers.
Read full term ->Container Orchestration
Container orchestration automates the deployment, scaling, and management of containerized applications.
Read full term ->Containerization
Application packaging method that bundles code and dependencies into isolated runtime units.
Read full term ->Database Fundamentals
Database fundamentals in the cloud involve understanding how databases are deployed, managed, and scaled in a cloud environment.
Read full term ->Deployment Issues
Deployment issues refer to problems encountered during the deployment of applications or services in cloud environments.
Read full term ->Docker
Popular platform and tooling ecosystem for building and running containers.
Read full term ->Elasticity
Ability to dynamically scale resources up or down as demand changes.
Read full term ->Event-Driven Architectures
Event-driven architectures in cloud computing rely on events to trigger actions or workflows, enabling responsive and scalable applications.
Read full term ->Failover
Failover is the process of automatically switching to a standby server or system when the primary one fails.
Read full term ->Fault Tolerance
System capability to continue operating despite component failures.
Read full term ->File Storage
Storage model exposing shared hierarchical filesystems over network protocols.
Read full term ->High Availability
High availability refers to systems that are continuously operational with minimal downtime, often achieved through redundancy and failover mechanisms.
Read full term ->Hot Site
Fully provisioned disaster recovery site that can assume workloads quickly.
Read full term ->Hypervisor
Software layer that creates and manages virtual machines on physical hardware.
Read full term ->IAM
IAM (Identity and Access Management) is a framework of policies and technologies for ensuring that the right individuals have access to the right resources on Google Cloud.
Read full term ->Immutable Infrastructure
Deployment model where systems are replaced rather than modified in place.
Read full term ->Infrastructure as Code (IaC)
The practice of managing and provisioning computing infrastructure through machine-readable definition files, rather than physical hardware configuration.
Read full term ->Kubernetes
Container orchestration platform for deploying, scaling, and managing containerized workloads.
Read full term ->Latency
Latency is the delay between a request and the response in a network, affecting the speed of data transmission.
Read full term ->Lifecycle Management
Lifecycle management encompasses the processes of deploying, maintaining, and retiring cloud resources throughout their lifecycle.
Read full term ->Load Balancer
Device or service that distributes incoming traffic across multiple backend servers for availability and performance.
Read full term ->Metrics
Quantitative measurements used to monitor system behavior and performance.
Read full term ->Misconfigurations
Misconfigurations are incorrect settings in hardware or software that can lead to vulnerabilities or performance issues.
Read full term ->Multicloud
Strategy using services from multiple cloud providers within one environment.
Read full term ->Network ACL
A Network Access Control List (ACL) is an optional layer of security for your VPC that acts as a firewall for controlling traffic in and out of one or more subnets.
Read full term ->Network Connectivity
Network connectivity in cloud environments involves ensuring reliable and secure connections between cloud resources and users.
Read full term ->Network Time Protocol (NTP)
NTP is a protocol used to synchronize the clocks of computers over a network, ensuring accurate timekeeping.
Read full term ->Object Storage
Storage model that manages data as objects with metadata in flat namespaces.
Read full term ->Observability
Ability to understand system state using telemetry such as logs, metrics, and traces.
Read full term ->Region
Geographic cloud area containing multiple availability zones.
Read full term ->Resource Optimization
Resource optimization in cloud computing refers to the process of maximizing performance and cost efficiency of cloud resources.
Read full term ->Resource Provisioning
Resource provisioning in the cloud involves allocating and configuring the necessary resources to support applications and services.
Read full term ->RPO
Recovery Point Objective is the maximum acceptable amount of data loss measured in time.
Read full term ->RTO
Recovery Time Objective is the maximum acceptable time to restore service after an outage.
Read full term ->Scalability
Scalability is the ability of a system to handle increased load by adding resources, ensuring consistent performance as demand grows.
Read full term ->Security Controls
Security controls are measures implemented to protect cloud environments from unauthorized access and threats.
Read full term ->Security Group
Stateful virtual firewall attached to AWS resources, controlling allowed inbound and outbound traffic.
Read full term ->Service Disruptions
Service disruptions occur when cloud services are interrupted or degraded, impacting availability and performance.
Read full term ->Service Level Agreement (SLA)
Formal commitment defining service expectations such as uptime and support response.
Read full term ->Shared Responsibility Model
The shared responsibility model outlines the division of responsibilities between cloud providers and customers, where providers manage the infrastructure and customers manage their data and applications.
Read full term ->Snapshot
Point-in-time copy of storage state used for backup, rollback, or cloning.
Read full term ->Supply Chain Risk
Security risk introduced through vendors, software components, or service providers.
Read full term ->System Requirements
System requirements analysis involves determining the necessary specifications and configurations for migrating workloads to the cloud.
Read full term ->Throughput
Actual rate of successful data transfer through a network path.
Read full term ->Virtual Private Cloud (VPC)
A VPC is a private cloud computing environment hosted within a public cloud, providing a virtualized network environment that is logically isolated from other cloud tenants.
Read full term ->Vulnerability Management
Continuous process of identifying, evaluating, prioritizing, and remediating security weaknesses in systems and software.
Read full term ->Warm Site
Partially provisioned recovery site with moderate activation time.
Read full term ->Workload Migrations
Workload migrations refer to the process of moving applications, data, and workloads from on-premises or other environments to the cloud.
Read full term ->Zero-Touch Provisioning
Automated onboarding method that configures devices with minimal manual intervention.
Read full term ->
