Virtualization Concepts Flashcards

OBJ 4.2: Given a scenario, select and install storage devices (37 cards)

1
Q

Host computer installed with a _________ that can be used to install and
manage multiple guest operating systems or virtual machines (VMs)
-Manages the distribution of the physical resources of a server to the VMs

A

hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Runs directly on the host hardware and functions as the
operating system

A

Type I Hypervisor (Bare Metal)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Runs within the normal operating system

A

Type II Hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ensure that each virtual machine runs its own copy of an ______________

A

operating
system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Server-based solution that runs the application on servers
in a centralized location

A

Server-based (Terminal services)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Client-based solution that allows an application to be
packaged up and streamed directly to a user’s PC

A

Client-based (Application streaming)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Type of virtualization applied by a host operating system to provision an
isolated execution environment for an application
● Docker
● Parallels Virtuozzo
● OpenVZ
Each container relies on a common host OS as the base for each
container
-has less resources because it doesn’t
require its own copy of the OS for individual container

A

Containerization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: When a physical server crashes, all the organizations hosted on that same server
are affected

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: An organization’s failure to secure the virtual environments hosted on a shared
server poses a security risk for the other organizations

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Set up virtual servers in the cloud with proper

A

failover, redundancy, and elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hosting all VMs on the same type of hypervisor can also be exploited. How do we mitigate this?

A

● Proper configurations
● Patched and up-to-date hypervisor
● Tight access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

run directly on the host’s hardware to control the hardware and manage guest operating systems. They do not require a base operating system and have direct access to hardware resources

A

Type 1 Hypervisor /bare-metal hypervisors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

run on a host operating system that provides virtualization services. They are installed as applications on the host OS

A

Type 2 Hypervisor/hosted hypervisors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Allows for the full integration of the storage, network, and servers
without hardware changes

A

Hyperconverged Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encapsulates computer programs from the underlying OS on which they
are executed

A

Application Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hosts desktop OSs within a virtualized environment hosted by a
centralized server or server farm

A

Virtual Desktop Infrastructure (VDI)

17
Q

An isolated environment for analyzing pieces of malware
-Separates running processes and programs to mitigate system failures or
software vulnerabilities

18
Q

Allows for the testing and running of software applications for different
operating systems

A

Cross-Platform Virtualization

19
Q

System imitation

20
Q

New “physical” machine

A

Virtualization

21
Q

Improves the performance of virtual memory when running multiple
virtual machines on a single physical host

A

Second Level Address Translation (SLAT)

22
Q

SLAT for Intel

A

Extended Page Table (EPT)

23
Q

SLAT for AMD

A

Rapid Virtualization Indexing (RVI)

24
Q

● 32-bit processor
● 32-bit operating system can only access 4GB of RAM

25
● 16 exabytes of RAM ● 32-bit processor cannot run a 64-bit application
x64
26
Reduced instruction set and computer architecture in a computer processor
ARM
27
▪ Amount of physical memory installed on a physical server
System memory
28
System memory space for Windows
20-50 gigabytes
29
System memory space for Linux
4-8 gigabytes
30
System memory space for Mac
20-40 gigabytes
31
allows multiple cards for higher speeds ▪ CPU, processor, and capabilities ▪ System memory ▪ Networking ▪ Storage
NIC teaming configuration
32
Threat attempts to get out of an isolated VM and send commands to the underlying hypervisor ▪ easier to perform on a Type II hypervisor than a Type I hypervisor ● Patched ● Up to date -VM to hypervisor or host OS
VM Escape
33
Threat attempts to move from one VM to another on the same host -VM to VM
VM Hopping
34
Occurs when an attacker circumvents sandbox protections to gain access to the protected OS or other privileged processes o Patched o Up to date o Strong endpoint software protection o Limited extensions or add-ons
Sandbox Escape
35
▪ Migrates the virtual machine from one host to another while it is running ▪ Ensure that live migration only occurs on a trusted network or utilizes encryption
Live Migration
36
Leftover pieces of data that may exist in the hard drive which are no longer needed ● Encrypt virtual machine storage location ● Destroy encryption key
Data Remnants
37
Uncontrolled deployment of virtual machines
VM Sprawl