Chapter 7: Virtualization Flashcards

1
Q

On an x86 architecture without virtualization, the operating system runs at what privilege level?

A

Level 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which is the most powerful privilege level?

A

Level 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Applications tend to run at what privilege level?

A

Level 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When the software virtualization layer is introduced, the guest operating system is bumped to what privilege level?

A

Level 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This shift from a more powerful privilege to a less powerful privilege level is called?

A

Ring Deprivileging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What software method was developed to address the challenges of Ring Deprivileging?

A

Binary Translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Another software solution to Ring Deprivileging used by Xen is?

A

Paravirtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In Paravirtualized environments the guest operating system is?

A

“Virtual-Aware”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What technology allows significantly improved handling of multiple guest operating systems?

A

Nested Paging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Paging occurs when?

A

Processors translate linear addresses generated by operating systems and applications into physical addresses, which are used to access memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Intel nested paging technology is known as?

A

Extended Page Tables (EPT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AMD nested paging technology is known as?

A

Rapid Virtualization Indexing (RVI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When translation is performed, it is stored for future use in?

A

Translation Look-aside Buffer (TLB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Intel VT-x allows both operating systems to run at what Privilege level?

A

Level 0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Utilization of what does not tend to be the largest area of concern with respect to virtualization performance?

A

Processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What two areas will be addressed in the next passes of virtualization hardware assists?

A

Hardware-based Page Tabled and I/O hardware assists.

17
Q

To use virtualization hardware assists, you must have all of the following.

A
  1. System BIOS enablement
    2. Hardware technology (for example, technology within the processors for first-generation hardware assists)
  2. Hypervisor support
18
Q

Sharing resources in a virtualized environment requires a?

A

Software virtualization manager

19
Q

The software virtualization layer is known as a?

A

Virtual machine manager

20
Q

Proper virtualization should?

A
  • Improve management of physical capacity
  • Improve control of machines
  • Simplify operation of virtual server pool
  • Reduce risks to business continuity
  • Dynamically scale resources to meet demand
21
Q

Typical virtualization consolidation ratios are?

A

5:1 or 10:1

22
Q

Virtualization consolidation reduces what?

A

Enterprise power usage

23
Q

Virtualization streamlines what?

A

Security of data and system backups

24
Q

Two types of hardware virtualization?

A
  1. Intel Virtualization Technology (VT)

2. AMD-V

25
Both types of hardware virtualization provide what?
1. Allow guest O/S, VMM, and apps to run at standard privilege levels 2. Require no binary translation or paravirtualization 3. Increase reliability and security
26
A virtual machine manager is also called a?
Hypervisor
27
Each virtualized machine appears to have the host's what?
CPU, memory, and other resources to itself.
28
The hypervisor controls the host what?
Processor and resources, controlling guest O/S access to it
29
Privilege levels determine?
What hardware resources can be accessed by software
30
How many privilege levels are used outside of virtualization?
2