Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-501) by Mike Meyers
Author:Mike Meyers
Language: eng
Format: epub
Publisher: McGraw-Hill Education
Published: 2018-03-13T04:00:00+00:00
Host Availability and Elasticity
Virtual environments offer organizations real flexibility in the use of their infrastructure for both availability and elasticity. Virtualization supports availability in that you can almost instantly duplicate production hosts (whether physical or virtual) in a virtual environment, adding redundant capabilities for availability purposes or assets for use when existing hosts aren’t enough. You can copy physical machines and convert them to virtual machines and, because virtual machines are merely files, you can copy and reinstantiate them as new additional virtual machines (with a few basic configuration changes, of course).
Virtualization provides elasticity, meaning you can expand, duplicate, reconfigure, repurpose, and reuse resources in the environment (in this case, virtual hosts) on the fly, as the need for them arises or shrinks. This provides an organization flexibility in its use of resources, saving physical machines and reallocating, activating, and deactivating hosts as needed in dynamic-use situations. Virtual machines can be provisioned, configured, and stored in advance for just such instances.
Virtualization applies to networking components as well, enabling rapid scalability and adaptability of networks of virtual machines. Software defined networking (SDN) enables centralization of portions of the routing and switching (such as creation and maintaining of routing tables), that can then be rapidly pushed to routers and switches that only handle the packets and frames. Current SDN boxes employ security features that can rapidly respond, automatically, to attacks such as distributed denial-of-service (DDoS) attacks.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Red Hat Certified Specialist in Services Management and Automation EX358 Exam Guide by Eric McLeroy(6225)
The KCNA Book by Nigel Poulton(4273)
Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900 by Dwayne Natwick(3638)
Designing and Implementing Microsoft Azure Networking Solutions by David Okeyode(3544)
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide by Trevor Stuart and Joe Anich(3497)
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide by Trevor Stuart & Joe Anich(3419)
TCP IP by Todd Lammle(2988)
Microsoft Power BI Data Analyst Certification Guide by Ed Corcoran Orrin Edenfield(2924)
Unity Certified Programmer: Exam Guide by Philip Walker(2595)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(2524)
Networking A Beginner's Guide by Bruce Hallberg(2212)
Microsoft Power Platform Solution Architect's Handbook by Hugo Herrera(2041)
31 Days Before Your CompTIA A+ Exams (Shanette Luellen's Library) by Benjamin Patrick Conry(1864)
CompTIA A+ Practice Tests Core 1 (220-1101) and Core 2 (220-1102) by Ian Neil and Mark Birch(1798)
MCSA Windows Server 2016 Study Guide: Exam 70-741 by William Panek(1667)
PHP 7 Zend Certification Study Guide by Andrew Beak(1648)
Healthcare Information Security and Privacy (All-In-One) by Sean Murphy(1552)
CompTIA A+ Certification Guide (220-901 and 220-902) by Matthew Bennett(1527)
RHCSA & RHCE Red Hat Enterprise Linux 7: Training and Exam Preparation Guide (EX200 and EX300), Third Edition by Asghar Ghori(1490)
