Section 8: Virtualisation Flashcards

1
Q

What is Virtualisation?

A

Creation of a virtual resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Virtual Machine?

A

A container for an emulated computer that runs an entire OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 2 type of VM’s?

A
  1. System VM
  2. Processor VM
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a System Virtual Machine?

A

A complete platform designed to replace an entire physical computer and includes a full desktop/server OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why does virtualisation continue to rise?

A

In order to reduce the physical requirements for data centres

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do Virtual Machines run on top of?

A

A Hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does a Hypervisor do?

A

Manages the distribution of the physical resources of a host machine (server) to the virtual machines being run (guests)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 2 types of Hypervisors?

A
  1. Type 1 - Bare metal or native
  2. Type 2 - Runs inside a normal machine that uses windows or mac
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some type2 hypervisors?

A
  1. Virtualbox
  2. VMware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why are Type1 hypervisors more efficient than Type2?

A
  1. Faster
  2. doesn’t waste physical computer resources to run OS
  3. stripped down specialised OS providing physical VM
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Application Containerisation?

A

A single OS kernel is shared across multiple virtual machines but each virtual machine receives its own user space for programs and data

  • containerisation allows for rapid and efficient deployment of distributed applications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the most popular Container Based Virtualisation OS

A

Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some container based virtualisations available?

A
  1. Docker
  2. Parallels Virtuoso
  3. OpenVZ
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some unique vulnerabilities related to VMs?

A
  1. VM escape
  2. Data Remnants
  3. Privilege Elevation
  4. Live VM migration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Are VMs separated by other VMs by default?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a VM escape?

A

An attack that allows an attacker to break out of a normally isolated VM by interacting directly with the hypervisor

  • and then can enter another VM on the same machine
  • to mitigate
    • Virtual servers should be hosted on the same physical server as other VMs in the same network or network segment based on its classification
17
Q

Benefits of having Virtualised servers within a cloud environment?

A

Elasticity allows for scaling up or down to meet user demands

  • this can lead to a vulnerability known as Data Remnants
18
Q

What are Data Remnants?

A

Contents of a virtual machine that exist as deleted files on a cloud-based server after deprovisioning of a virtual machine

  • data could be recovered by an attacker which breaches confidentiality
19
Q

What is Privilege Escalation?

A

Occurs when a user is able to grant themselves the ability to run functions as a higher-level user

  • root or admin
  • can be catastrophic or physical server if this is performed on the hypervisor itself
  • VMware used to have this vulnerability where it allowed an attacker to escalate privileges into any of the guest OS hosted by that hypervisor
  • to prevent = update hot fixes and service packs
20
Q

When does Live Migration occur?

A

Live Migration occurs when a VM is moved from one physical server to another over the network

  • attackers can perform MITM attack and capture the data between these 2 servers
21
Q

What happens if the attacker exploits a vulnerability on the OS that is being shared by a container?

A

Anything hosted is exposed to that risk

22
Q

What security measures should you take for your VM?

A

Same as a physical server

  1. updating OS and apps
  2. AV on VM machines
  3. group policies
  4. strong passwords
23
Q

Should you keep your hypervisor up to date?

24
Q

Should you limit connectivity between the VM and the host?

A

Yes

  • isolate the machine from other machines on the hypervisor
25
Should you remove any unnecessary pieces of virtual hardware from the virtual machine?
Yes - minimises the attack surface
26
Should you consider spreading out VMs on several physical servers to prevent DDoS?
Yes - using proper patch management you can also keep your guest OS secure
27
What is Virtualisation Sprawl?
Occurs when VM are created, used, and deployed without proper management or oversight by the system admins
28
Should you enable encryption on the file that hosts the virtual machine?
Yes