701 - Chapter 5 Flashcards
What is the software that creates runs and manages VMs?
Hyper visor
The physical system hosting the VM is called what? The operating systems running on the on the above system are called what
Host…Guest
What is the term for the ability to resize the computing capacity of the VM?
Cloud scalability
What refers to the ability to dynamically change resources assigned to the VM based on the load?
Cloud elasticity
What is a computer with enough resources to boot and connect to a server to run specific applications or desktops called?
Thin client
What hosts a users desktop operating system on a server?
Virtual desktop infrastructure, VDI
What is a type of virtualization that run services or applications within isolated containers or application cells?
Containerization
What is an advantage of containerization and a disadvantage?
It uses fear resources and can be more efficient, but the container must use the same operating system as the host
What is an attack that allows an attacker to access the host system from within a virtual guest system? And what is the best way to prevent against it?
VM escape…keeping the system up to date with patches
What is when an organization has many VMs that aren’t appropriately managed?
VM sprawl
What refers to the potential for data or resources to remain on a shared infrastructure even after they are no longer needed, making them potentially accessible to other users?
Resource reuse
What are four common categories of endpoint security software?
Antivirus software, end point detection and response EDR, extended detection and response XDR, host intrusion prevention systems HIPS
What is the practice of making an operating system or application more secure from its default installation? It helps eliminate vulnerabilities from default configurations misconfiguration, and weak configurations.
Hardening
These practices help organizations deploy systems with secure configurations and enforce requirements that those secure configurations remain in place?
Configuration management
What are the three steps to using a baseline?
Establish an initial baseline configuration, deploy the baseline, maintain the baseline
One of the most common methods of deploying systems is with images starting with what?
A Master image
What are two important benefits of imaging?
Secure starting point and reduced cost
What are the procedures that ensure operating systems, applications and firmware or up-to-date with current patches? And what does this do?
Patch management procedures… it protects systems against known vulnerabilities
What defines the process and accounting structure for handling modification and upgrades? and what is the goal?
Change management… To reduce risks related to unintended outages and provide documentation for all changes
What is a list of applications authorized to run on a system?
An application allow list sometimes called a white list
This is a list of applications that the system will block from installing and executing?
Application block list or blacklist
Which is more restrictive a whitelist or a blacklist?
A white list
What protects all of the contents of a desk using encryption called? This may be done with specialized software or be done using specialized hardware known as what?
Full disk encryption, FDE… self encrypting drives SED
What is it called when the operating system goes through enough of the boot process to verify the integrity of the operating system and boot loading systems? And what does it do if it identifies an issue?
A measured boot… the system will halt the process and not come up