Security Requirements Flashcards

1
Q

▪ Threat attempts to get out of an isolated VM and send commands to the
underlying hypervisor
▪ Is easier to perform on a Type II hypervisor than a Type I
hypervisor
● Patched
● Up to date

A

VM Escape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat attempts to move from one VM to another on the same host

A

VM Hopping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Occurs when an attacker circumvents sandbox protections to gain access
to the protected OS or other privileged processes

A

Sandbox Escape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

▪ Sends the virtual machine from one host to another while it is running
▪ Ensure that live movement only occurs on a trusted network or utilizes
encryption

A

Live Migration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

▪ Leftover pieces of data that may exist in the hard drive which are no
longer needed
● Encrypt virtual machine storage location
● Destroy encryption key

A

Data Remnants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Uncontrolled deployment of virtual machines

A

VM Sprawl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly