CertNova
Menu
<- Back to glossary

CompTIA Cloud+ (CV0-004) glossary

Terms selected for CompTIA Cloud+ (CV0-004) based on common objective language and practice focus.

Hybrid Cloud

Hybrid cloud combines public and private clouds, allowing data and applications to be shared between them for greater flexibility and deployment options.

Read full term ->

IaaS

Infrastructure as a Service offering virtualized compute, storage, and networking.

Read full term ->

PaaS

Platform as a Service model providing managed runtime and development stack.

Read full term ->

Private Cloud

A private cloud is a cloud computing environment dedicated to a single organization, providing greater control and security over resources.

Read full term ->

Public Cloud

A public cloud is a cloud computing model where services are offered over the public internet and shared across multiple organizations.

Read full term ->

SaaS

Software as a Service where applications are accessed over the internet.

Read full term ->

Virtual Machine

Software-defined computer running as an isolated guest system.

Read full term ->

Virtualization

The creation of a virtual version of something, such as an operating system, a server, a storage device, or network resources.

Read full term ->

Ansible

Automation platform used for configuration management and orchestration.

Read full term ->

Autoscaling

A feature that automatically adjusts the number of compute resources based on current demand.

Read full term ->

Availability Zone (AZ)

One or more discrete data centers in a Region with independent power, cooling, and networking.

Read full term ->

Backup and Recovery

Backup and recovery strategies ensure that data is protected and can be restored in the event of data loss or corruption.

Read full term ->

Billing Management

Billing management in cloud computing involves tracking and optimizing costs associated with cloud resource usage.

Read full term ->

Block Storage

Storage model exposing raw blocks to systems, often used for VM disks and databases.

Read full term ->

Cloud Access Security Broker (CASB)

A CASB is a security policy enforcement point positioned between cloud service consumers and providers to apply enterprise security policies as cloud-based resources are accessed.

Read full term ->

CI/CD Pipelines

CI/CD pipelines automate the integration and deployment of code changes, facilitating continuous delivery of software updates.

Read full term ->

Cloud Bursting

Pattern where workloads run on-premises but temporarily extend into public cloud under peak demand.

Read full term ->

Cloud Networking

Cloud networking involves deploying and managing network resources in a cloud environment to ensure connectivity and security.

Read full term ->

Cloud Orchestration

Coordinated automation of multi-step cloud operations and resource lifecycles.

Read full term ->

Cold Site

Disaster recovery facility with minimal pre-installed systems requiring setup before use.

Read full term ->

Compliance Standards

Compliance standards in cloud computing refer to the adherence to regulatory and industry standards such as PCI DSS, SOC 2, and ISO 27001.

Read full term ->

Container Image

Packaged filesystem and runtime instructions used to create containers.

Read full term ->

Container Orchestration

Container orchestration automates the deployment, scaling, and management of containerized applications.

Read full term ->

Containerization

Application packaging method that bundles code and dependencies into isolated runtime units.

Read full term ->

Database Fundamentals

Database fundamentals in the cloud involve understanding how databases are deployed, managed, and scaled in a cloud environment.

Read full term ->

Deployment Issues

Deployment issues refer to problems encountered during the deployment of applications or services in cloud environments.

Read full term ->

Docker

Popular platform and tooling ecosystem for building and running containers.

Read full term ->

Elasticity

Ability to dynamically scale resources up or down as demand changes.

Read full term ->

Event-Driven Architectures

Event-driven architectures in cloud computing rely on events to trigger actions or workflows, enabling responsive and scalable applications.

Read full term ->

Failover

Failover is the process of automatically switching to a standby server or system when the primary one fails.

Read full term ->

Fault Tolerance

System capability to continue operating despite component failures.

Read full term ->

File Storage

Storage model exposing shared hierarchical filesystems over network protocols.

Read full term ->

High Availability

High availability refers to systems that are continuously operational with minimal downtime, often achieved through redundancy and failover mechanisms.

Read full term ->

Hot Site

Fully provisioned disaster recovery site that can assume workloads quickly.

Read full term ->

Hypervisor

Software layer that creates and manages virtual machines on physical hardware.

Read full term ->

IAM

IAM (Identity and Access Management) is a framework of policies and technologies for ensuring that the right individuals have access to the right resources on Google Cloud.

Read full term ->

Immutable Infrastructure

Deployment model where systems are replaced rather than modified in place.

Read full term ->

Infrastructure as Code (IaC)

The practice of managing and provisioning computing infrastructure through machine-readable definition files, rather than physical hardware configuration.

Read full term ->

Kubernetes

Container orchestration platform for deploying, scaling, and managing containerized workloads.

Read full term ->

Latency

Latency is the delay between a request and the response in a network, affecting the speed of data transmission.

Read full term ->

Lifecycle Management

Lifecycle management encompasses the processes of deploying, maintaining, and retiring cloud resources throughout their lifecycle.

Read full term ->

Load Balancer

Device or service that distributes incoming traffic across multiple backend servers for availability and performance.

Read full term ->

Metrics

Quantitative measurements used to monitor system behavior and performance.

Read full term ->

Misconfigurations

Misconfigurations are incorrect settings in hardware or software that can lead to vulnerabilities or performance issues.

Read full term ->

Multicloud

Strategy using services from multiple cloud providers within one environment.

Read full term ->

Network ACL

A Network Access Control List (ACL) is an optional layer of security for your VPC that acts as a firewall for controlling traffic in and out of one or more subnets.

Read full term ->

Network Connectivity

Network connectivity in cloud environments involves ensuring reliable and secure connections between cloud resources and users.

Read full term ->

Network Time Protocol (NTP)

NTP is a protocol used to synchronize the clocks of computers over a network, ensuring accurate timekeeping.

Read full term ->

Object Storage

Storage model that manages data as objects with metadata in flat namespaces.

Read full term ->

Observability

Ability to understand system state using telemetry such as logs, metrics, and traces.

Read full term ->

Region

Geographic cloud area containing multiple availability zones.

Read full term ->

Resource Optimization

Resource optimization in cloud computing refers to the process of maximizing performance and cost efficiency of cloud resources.

Read full term ->

Resource Provisioning

Resource provisioning in the cloud involves allocating and configuring the necessary resources to support applications and services.

Read full term ->

RPO

Recovery Point Objective is the maximum acceptable amount of data loss measured in time.

Read full term ->

RTO

Recovery Time Objective is the maximum acceptable time to restore service after an outage.

Read full term ->

Scalability

Scalability is the ability of a system to handle increased load by adding resources, ensuring consistent performance as demand grows.

Read full term ->

Security Controls

Security controls are measures implemented to protect cloud environments from unauthorized access and threats.

Read full term ->

Security Group

Stateful virtual firewall attached to AWS resources, controlling allowed inbound and outbound traffic.

Read full term ->

Service Disruptions

Service disruptions occur when cloud services are interrupted or degraded, impacting availability and performance.

Read full term ->

Service Level Agreement (SLA)

Formal commitment defining service expectations such as uptime and support response.

Read full term ->

Shared Responsibility Model

The shared responsibility model outlines the division of responsibilities between cloud providers and customers, where providers manage the infrastructure and customers manage their data and applications.

Read full term ->

Snapshot

Point-in-time copy of storage state used for backup, rollback, or cloning.

Read full term ->

Supply Chain Risk

Security risk introduced through vendors, software components, or service providers.

Read full term ->

System Requirements

System requirements analysis involves determining the necessary specifications and configurations for migrating workloads to the cloud.

Read full term ->

Throughput

Actual rate of successful data transfer through a network path.

Read full term ->

Virtual Private Cloud (VPC)

A VPC is a private cloud computing environment hosted within a public cloud, providing a virtualized network environment that is logically isolated from other cloud tenants.

Read full term ->

Vulnerability Management

Continuous process of identifying, evaluating, prioritizing, and remediating security weaknesses in systems and software.

Read full term ->

Warm Site

Partially provisioned recovery site with moderate activation time.

Read full term ->

Workload Migrations

Workload migrations refer to the process of moving applications, data, and workloads from on-premises or other environments to the cloud.

Read full term ->

Zero-Touch Provisioning

Automated onboarding method that configures devices with minimal manual intervention.

Read full term ->
Start practice for CV0-004