4.2 Virtualisation Concepts Flashcards

1
Q

Describe the setup for virtualisation.

A

A host machine installed with a hypervisor that can be used to install and manage multiple guest OSs or VMs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the two different types of hypervisors

A

Type 1: Runs directly on the host hardware and functions as the OS
Type 2: Runs within the normal OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name and describe the two different types of virtualisation

A
  • Server-based (Terminal services)
    Server-based solution that runs the application on servers in a centralised location
  • Client-based (Application streaming)
    Client-based solution that allows an application to be packaged up and streamed directly to a user’s PC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define containerisation and give some examples of software that does this

A

A type of virtualisation applied by a host OS to provision an isolated execution environment for an application.
Software: Docker, Parallels Virtuozzo, OpenVZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do you reduce the risk of your virtual machine setup being exploited?

A
  • Proper configurations
  • Patched and up-to-date hypervisor
  • Tight access control
  • Proper failover, redundancy and elasticity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does a hypervisor do?

A

Manages distribution of the physical resources of a server to the VMs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does containerisation work?

A

Each container relies on a common host OS as the base; it uses less resources because each container doesn’t require its own copy of the OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the benefit of hyperconverged infrastructure?

A

Allows for full integration of storage, network and servers, without hardware changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does application virtualisation do?

A

Encapsulates computer programs from the underlying OS on which they are executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does VDI do?

A

Hosts desktop OSs within a virtualised environment hosted by a centralised server/server farm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a sandbox (malware)?

A

An isolated environment for analysing pieces of malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Where would you use cross-platform virtualisation, and what are the two types?

A

You would use it to test and run software applications for different operating systems. The two types are emulation (system imitation) and virtualisation (new “physical” machine)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does second level address translation do?

A

Improves the performance of virtual memory when running multiple VMs on a single physical host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What technology do Intel and AMD use, respectively, to support SLAT?

A

Intel - EPT (Extended Page Table)
AMD - RVI (Rapid Virtualisation Indexing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe the features of the two different versions of SLAT.

A

x86
- 32-bit processor
- 32-bit OS can only access 4GB RAM
x64
- 16 exabytes RAM
- application cannot run on a 32-bit processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is ARM?

A

Reduced instruction set and computer architeture (RISC) in a computer processor

17
Q

What is system memory?

A

The amount of memory installed on a physical server

18
Q

How much GB of space do each of the operating systems take up on system memory?

A

Windows: 20-50GB
Linux: 4-8GB
Mac: 20-40GB

19
Q

What does an NIC do?

A
  • Provides a computer with a dedicated, full-time connection to a network -
  • Allows computers to communicate over a computer network
20
Q

What is VM escape, and which hypervisor is it easier to perform on?

A

Where the threat attempts to get out of an isolated VM and send commands to the underlying hypervisor. It is easier to perform on a Type 2 hypervisor.

21
Q

What is VM hopping?

A

Where the threat attempts to move from one VM to another on the same host.

22
Q

What is sandboxing (in the context of VM security)?

A

Separating running processes and programs to mitigate system failures or software vulnerabilites.

23
Q

What is a sandbox escape?

A

When an attacker circumvents sandbox protections to gain access to the protected OS or other privileged processes

24
Q

How can you prevent a sandbox escape from occurring?

A

Ensure the system is patched, up-to-date, has strong endpoint software protection, and limited extensions/add-ons

25
Q

What is live migration?

A

Migrating the VM from one host to another while it is running. It should only occur on a trusted network, or utilise encryption.

26
Q

What are data remnants and how can you protect them?

A

Leftover pieces of data that may exist in the harddrive which are no longer needed. You could encrypt the virtual machine storage location and destroy the encryption key to protect them.

27
Q

What is VM sprawl?

A

Uncontrolled deployment of virtual machines.