Implementing Client Virtualization and Cloud Computing Flashcards

1
Q

Definition of Virtualization

A

Virtualization: Software allowing a host computer to run multiple guest operating systems known as virtual machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does a virtual platform require

A

Computer(s)
The hypervisor or Virtual Machine Monitor (VMM)
Guest operating systems or Virtual Machines (VMs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Give the functions of hypervisors and a description of hypervisors

A

Each VM runs in a protected space
View from inside the VM is a CPU and memory
A hard disk is an image file
Components such as network adapters are emulated
Main functions of hypervisors
Emulation
Guest OS support
Assigning resources to each guest’s OS
Configuring networking
Configuring security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Definition of Type 2 hypervisor and examples

A

Type 2 hypervisor: A host-based hypervisor in which you install the host operating system first, then install the hypervisor.
Examples:
VMware Workstation
Oracle Virtual Box
Parallels Workstation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Definition of Type 1 hypervisor and examples

A

Type 1 hypervisor: A bare metal hypervisor that you install directly on the server’s hardware.

Examples:
VMware ESX Server
Microsoft Hyper-V
Citrix XEN Server
Linux KVM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Give all the points processor support and resource requirements

A

CPU with built-in instruction sets to facilitate virtualization
Intel: VT-x
AMD: AMD-v
SLAT to improve virtual memory performance
Intel: EPT
AMD: RVI
Multiple CPU resources
SMP
Multiple physical processors
Multi-core
HyperThreading
Each guest OS requires memory above that required by the host.
Each guest OS requires hard disk space for the VM image.
Most hypervisors allow guest VMs to use host adapters and peripherals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Give a full description of virtual networks

A

Multiple VMs can communicate with each other using standard networking protocols.
Guest OS emulates standard network adapter hardware.
Can often have multiple adapters.
Configurable just like a physical adapter.
Hypervisor implements network connectivity via virtual switches.
Function like Ethernet switches.
Implemented in software.
Connectivity between virtual adapters and virtual switches configured in the hypervisor.
Can configure connectivity between host physical NIC and virtual switches.
Provides a bridge between the host platform and physical network switches.
Allows frames to pass between:
Physical and virtual machines.
Virtual machines and the host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Give points to virtual machines

A

Client and Server OSs can be virtualized
Some hypervisors have limited support for certain OSs
Many purposes for deploying a virtual platform
Client-side virtualization
Deployed to desktop-type machines
Server-side virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is client-side virtualization

A

Client-side virtualization: Any solution designed to run on desktops or workstations in which the user interacts with the virtualization host directly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Give examples of Virtual Machines

A

Virtual labs
Support legacy software applications
Development environment
Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Definition of Server-side virtualization

A

Server-side virtualization: A solution in which one or more virtual servers are created on a physical server in which each virtual server acts like it was a separate computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Definition of server consolidation

A

Server consolidation: Using virtual servers, make more efficient use of system resources and hardware since most servers’ capacity is not fully utilized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Give the advantages of virtual machines

A

Better hardware utilization:
Typical server hardware resource utilization of 10%.
Implies 8-9 additional server instances could obtain the same performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Definition of Rogue VM

A

Rogue VM: A virtual machine that has been installed without authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Definition of VM sprawl

A

VM sprawl: The uncontrolled development of more and more virtual machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Give a full description of Guest OS Security

A

Each guest OS must be patched and protected against malware.
Running security software on each guest OS can cause performance issues.
Rogue VMs and VM sprawl are major security concerns.
System management software can detect rogue VMs.
VMs should conform to an application template.
Rogue developers often install backdoors and logic bombs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Give a full description of Host Security

A

Host Security
If the host is compromised, so is guest Oss.
Host hardware failures are a single point of failure.
High resource utilization can decrease the MTBF of components.
DOS attack on a host or hypervisor causes more damage than to a single server.
Most hypervisors support disk snapshots to revert to the saved images.
Snapshots can be misused to perform DoS attacks.

18
Q

Give a full description of Hypervisor Security

A

The hypervisor provides another attack surface
Few attacks have been detected so far
Keep hypervisor up-to-date with patches to help prevent VM escapes

19
Q

Definition of MTBF

A

MTBF: The rating on a device or component that predicts the expected time between failures.

20
Q

Definition of DoS

A

Denial of Service (DoS): A network attack that aims to disrupt a service, usually by overloading it.

21
Q

Definition of VM escaping

A

VM escaping: Malware running on a guest OS jumping to another guest or to the host.

22
Q

Definition of Cloud

A

Cloud: Any sort of IT infrastructure provided to the end user where the end user is not aware of or responsible for any details of the procurement, implementation, or management of the infrastructure.

23
Q

What is the NIST definition of cloud computing

A

NIST definition for cloud computing:
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.

24
Q

Examples of Cloud Computing

A

On-demand self-service
Broad network access
Resource pooling
Rapid elasticity
Measured service

25
Q

Definition of Rapid elasticity

A

Rapid elasticity: The ability to scale cloud computing resources quickly to meet peak demand and just as quickly remove resources if they are not currently needed.

26
Q

Definition of measured service

A

Measured service: A provider’s ability to control and bill a customer’s use of resources such as CPU, memory, disk, and network bandwidth through metering.

27
Q

Give the benefits of Cloud Computing

A

Rapid elasticity
On-demand and pay-per-use
Measured service
Resource pooling
Flexibility

28
Q

Give all common cloud models

A

Public or multi-tenant
Hosted private
Private
Community
Hybrid

29
Q

Give a description of Internal and External Shared Resources

A

All networks share a pool of resources
File servers provide disk storage resources to clients
Shared folders
Servers use shared disk storage
SANs
A mix of virtualization and hybrid cloud solutions
Allows shared resources to be provisioned using:
Internally owned assets
Externally provisioned assets

30
Q

Definition of Iaas

A

IaaS: A cloud computing service that enables a consumer to outsource computing equipment purchases and run their own data center.

31
Q

Definition of Paas

A

PaaS: A cloud computing service that enables consumers to rent fully configured systems that are set up for specific purposes.

32
Q

Definition of SaaS

A

SaaS: A cloud computing service that enables a service provider to make applications available over the Internet.

33
Q

Definition of VDI

A

VDI: Using a VM as a means of provisioning corporate desktops

34
Q

Definition of VDE

A

VDE: The virtual desktop environment or workspace.

35
Q

Give a full description of Virtual Desktops

A

Desktop computers are replaced by low-spec, low-power thin client computers.
The thin client boots a minimal OS, allowing the user to log on to a VM stored on the company server infrastructure.
All application processing and data storage in the VDE or workspace is performed by the server.
All data is stored on the server so it is easier to back up, and the desktop VMs are easier to support and troubleshoot.
VDIs are better locked against unsecured user practices.
The main disadvantage is that in the event of a failure in the server or network infrastructure, users have no local processing ability.
Virtual NIC

36
Q

Definition of Application virtualization

A

Application virtualization: Rather than run the whole client desktop as a virtual platform, the client either accesses a particular application hosted on a server or streams the application from the server to the client for local processing.

37
Q

Definition of virtual application

A

Virtual application streaming: Just enough of an application is installed on the end-user device for the system to recognize that the application is available to the user, and when the user accesses the application, additional portions of the code are downloaded to the device.

38
Q

Give examples of Cloud-Based Applications

A

Off-site email applications
Cloud file storage
Virtual application streaming
Client platforms

39
Q

Definition of container virtualization

A

Container virtualization: Enforces resource separation at the operating system level with each user having a separate instance to run in.

40
Q

Give a full description of Cloud-Based Network Controllers

A

When using a mix of local and cloud-based resources:
Can be difficult to see the entire network from a single management and monitoring interface.
Cloud-based network controller:
Allows you to register and monitor all of the organization’s networks.
Depends on Software Defined Networking (SDN).
SDN can be used to configure network access devices through software programs and scripts.