Virtualizatrion Concepts Flashcards

OBJ 4:2 Given a scenario, select and install storage devices

1
Q

Virtualization

A

host computer installed with a hypervisor that can be used to install and manage multiple guest operating systems or virtual machines. (VMs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Type 1 Hypervisor

A

Type I Hypervisor (Bare Metal)
Runs directly on the host hardware and functions as the
operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Type II Hypervisor

A

Runs within the normal operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Virtualization

A

Ensure that each virtual machine runs its own copy of an operating
system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Server-based (Terminal services)

A

Server-based solution that runs the application on servers
in a centralized location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Client-based (Application streaming)

A

Client-based solution that allows an application to be
packaged up and streamed directly to a user’s PC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Containerization

A

Type of virtualization applied by a host operating system to provision an
isolated execution environment for an application
● Docker
● Parallels Virtuozzo
● OpenVZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Containerization Vulnerabilities 1

A

When a physical server crashes, all the organizations hosted on that same server are affected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Containerization Vulnerabilities 2

A

An organization’s failure to secure the virtual environments hosted on a shared
server poses a security risk for the other organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How to minimize risk to physical servers from being overwhelmed?

A

Set up virtual servers in the cloud with proper failover, redundancy, and
elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What can be another vulnerability to VMs from attackers?

A

Hosting all VMs on the same type of hypervisor can also be exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

how to mitigate the risk associated with using the same type hypervisor?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How should an organization minimize the risk of attack when using a single platform hypervisor?

A

The organization should utilize -
● Proper configurations
● Patched and up-to-date hypervisor
● Tight access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of hypervisors?

A

Manages the distribution of the physical resources of a server to the VMs
● Type I
o Bare metal
● Type II
o Hosted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of Container Based Virtualization (Containerization)

A

▪ Each container relies on a common host OS as the base for each
container
▪ Container-based virtualization has less resources because it doesn’t
require its own copy of the OS for individual container

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Purpose for Hyperconverged Infrastructure?

A

Allows for the full integration of the storage, network, and servers
without hardware changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Purpose for Application Virtualization?

A

Encapsulates computer programs from the underlying OS on which they
are executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Purpose for Virtual Desktop Infrastructure (VDI)

A

Hosts desktop OSs within a virtualized environment hosted by a
centralized server or server farm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Purpose for Sandbox?

A

An isolated environment for analyzing pieces of malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Purpose for Cross-Platform Virtualization?

A

Allows for the testing and running of software applications for different
operating systems
● Emulation - System imitation
● Virtualization - New “physical” machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Questions to ask when considering VM?

A

Should I virtualize?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Questions ? Traditional VMs, or Containerization?

A

What are the risk vs rewards towards each decision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Hypervisor

A

Manages the distribution of the physical resources of a server to the VMs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Type I Hypervisor

A

Bare metal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Type II Hypervisor
Hosted
26
Container-Based Virtualization (Containerization)
▪ Each container relies on a common host OS as the base for each container ▪ Container-based virtualization has less resources because it doesn’t require its own copy of the OS for individual container
27
Hyperconverged Infrastructure
Allows for the full integration of the storage, network, and servers without hardware changes
28
Application Virtualization
Encapsulates computer programs from the underlying OS on which they are executed
29
Virtual Desktop Infrastructure (VDI)
Hosts desktop OSs within a virtualized environment hosted by a centralized server or server farm
30
Sandbox
An isolated environment for analyzing pieces of malware
31
Cross-Platform Virtualization
Allows for the testing and running of software applications for different operating systems ● Emulation - System imitation ● Virtualization - New “physical” machine
32
Resource Requirements
Focus on four main areas - CPU and Virtualization Extensions, Storage, System Memory, and Networking.
33
Resource Requirements - Second Level Address Translation (SLAT)
Improves the performance of virtual memory when running multiple virtual machines on a single physical host
34
Resource Requirements - Second Level Address Translation (SLAT) - Intel
Extended Page Table (EPT)
35
Resource Requirements - Second Level Address Translation (SLAT) - AMD
Rapid Virtualization Indexing (RVI)
36
Resource Requirements - CPU - x86
32-bit processor 32-bit operating system can only access 4GB of RAM
37
Resource Requirements - CPU - x64
16 exabytes of RAM 32-bit processor cannot run a 64-bit application
38
Resource Requirements - CPU - ARM
Reduced instruction set and computer architecture in a computer processor
39
Resource Requirements - System Memory
Amount of physical memory installed on a physical server Barebones Windows installation takes 20-50 gigabytes of space Linux installation takes 4-8 gigabytes of space Mac environment takes 20-40 gigabytes of space
40
Resource Requirements - Networking - NIC teaming configuration allows multiple cards for higher speeds
CPU, processor, and capabilities System memory Networking Storage
41
Security Requirements VM Escape
Threat attempts to get out of an isolated VM and send commands to the underlying hypervisor ▪ VM escape is easier to perform on a Type II hypervisor than a Type I hypervisor Verified always Patched Verify always Up to date
42
Security Requirements VM Hopping
Threat attempts to move from one VM to another on the same host
43
Security Requirements VM Hopping
VM to VM
44
Security Requirements VM Escape
VM to hypervisor or host OS ▪ Up to date ▪ Patched ▪ Securely configured
45
Security Requirements Sandbox
Separates running processes and programs to mitigate system failures or software vulnerabilities
46
Security Requirements Sandbox Escape
Occurs when an attacker circumvents sandbox protections to gain access to the protected OS or other privileged processes o Patched o Up to date o Strong endpoint software protection o Limited extensions or add-ons
47
Security Requirements Live Migration
Migrates the virtual machine from one host to another while it is running ▪ Ensure that live migration only occurs on a trusted network or utilizes encryption
48
Security Requirements Data Remnants
Leftover pieces of data that may exist in the hard drive which are no longer needed ● Encrypt virtual machine storage location ● Destroy encryption key
49
Security Requirements VM Sprawl
VM Sprawl
50
NIC Teaming Configuration
Allows multiple cards for higher speeds
51
Cloud Computing
The practice of using a network of remote servers hosted on the Internet
52
Characteristics of the Cloud - High Availability
Services experience very little downtime when using the cloud ▪ Availability is the percentage of uptime versus downtime
53
Characteristics of the Cloud - Scalability
Ability to increase the number of items in a system at a linear rate or less than a linear rate
54
Characteristics of the Cloud - Vertical Scaling (Scaling Up)
Increasing the power of the existing resources in the working environment
55
Characteristics of the Cloud - Horizontal Scaling (Scaling Out)
Adding additional resources to help handle the extra load being experienced
56
Characteristics of the Cloud - Rapid Elasticity
The ability to quickly scale up or down ● Elasticity is the system’s ability to handle changes to demand in real time
57
Characteristics of the Cloud - Metered Utilization
Being charged for a service on a pay per use basis. The benefit of using the cloud is that most things are done on a metered basis.
58
Characteristics of the Cloud - Measured Services
▪ Charging is based upon the actual usage of the service being consumed ▪ Measured services are charged based on the actual usage of the service being consumed
59
Characteristics of the Cloud - Shared Resources
The ability to minimize the costs by putting VMs on other servers. ▪ Shared resources is pooling together all the hardware to make a cloud provider.
60
Characteristics of the Cloud - File Synchronization
The ability to store data that can spread to other places depending on the configuration.
61
Cloud Deployment Models -Public Cloud
Systems and users interact with devices on public networks, such as the Internet and other clouds
62
Cloud Deployment Models -Public Cloud
Systems and users interact with devices on public networks, such as the Internet and other clouds
63
Cloud Deployment Models -Public Cloud
Systems and users interact with devices on public networks, such as the Internet and other clouds
64
Cloud Deployment Models - Private Cloud
Systems and users that only have access with other devices inside the same private cloud or system
65
Cloud Deployment Models - Hybrid Cloud
Combination of private and public clouds
66
Cloud Deployment Models - Community Cloud
Collaborative effort where infrastructure is shared between several organizations from a specific community with common concerns
67
Cloud Deployment Models - Multitenancy
The ability for customers to share computing resources in a public or private cloud
68
Cloud Deployment Models - Single-Tenancy
Assigns a particular resource to a single organization
69
Cloud Service Models - On-Premise Solution
▪ The need to procure hardware, software, and personnel necessary to run the organization’s cloud ▪ On-premise solution allows the ability to control all the physical and logical access to servers
70
Cloud Service Models - Hosted Solution
Third-party service provider that provides all the hardware and facilities needed to maintain a cloud solution
71
Cloud Service Models
On-Premise, SaaS, PaaS, IaaS
72
On- Premise Cloud Model
On-premise software is installed locally, on your business' computers and servers, where cloud software is hosted on the vendor's server and accessed via a web browser.
73
SaaS Cloud Model
Software as a Service - Software as a Service (SaaS) is a method for delivering software applications over the Internet, on demand and typically on a subscription basis. With SaaS, Cloud Service Providers (CSPs) host and manage the application software and underlying infrastructure, and handle any maintenance, like software upgrades and security patching. Users connect to the application over the Internet, usually by a web browser on their phone, tablet, or PC.
74
PaaS Cloud Model
Platform as a Service - a cloud computing services that supply an on-demand environment for developing, testing, delivering, and managing software applications. PaaS is designed to make it easier for developers to quickly create applications (e.g., web, mobile apps), without worrying about setting up or managing the underlying infrastructure of servers, storage, network, and databases needed for development.
75
IaaS Cloud Model
Infrastructure as a Service - The most basic category of commercial cloud computing services. With Infrastructure as a Service (IaaS), you rent IT infrastructure - servers and virtual machines (VMs), storage, networks, operating systems - from a cloud provider. IaaS is an instant computing infrastructure, provisioned and managed over the Internet. Quickly scale up and down with demand, and pay only for what you use. IaaS helps you avoid the expense and complexity of buying and managing your own physical servers and other datacenter infrastructure. Each resource is offered as a separate commercial service component, and you only need to rent a particular one for as long as you need it. The cloud computing service provider manages the infrastructure, while you purchase, install, configure, and manage your own software - operating systems, middleware, and applications.
76
Virtual Desktop Infrastructure (VDI) -Virtual Desktop Infrastructure (VDI)
Hosts desktop OSs within a virtualized environment hosted by a centralized server or server farm
77
Virtual Desktop Infrastructure (VDI) - Server
Performs all the application processing and data storage
78
Virtual Desktop Infrastructure (VDI) - Centralized Model
Hosts all the desktop instances on a single server or server farm
79
Virtual Desktop Infrastructure (VDI) - Hosted Model/ Desktop as a Service (DAAS)
Maintained by a service provider and provided to the end user as a service
80
Virtual Desktop Infrastructure (VDI) - Remote Virtual Desktop Model
Copies the desktop image to a local machine prior to being used by the end user
81
Cloud Storage Services - Cloud Storage Application
Amount of space on a cloud-based server as file storage
82
Cloud Storage Services - File Synchronization
The ability to synchronize from different devices using a single account
83
Cloud Storage Services - Content Delivery Network (CDN)
Network of servers that locates the nearest server to minimize delay or download time
84
Software Defined Network (SDN)- Software
Software-Defined Networking (SDN) ▪ Enables the network to be intelligently and centrally controlled, or programmed, using software applications ● Can be changed automatically by the network itself using automation and orchestration
85
● Software Defined Network (SDN) - Application Layer
Focuses on the communication resource requests or information about the network as a whole
86
Software Defined Network (SDN) - Control Layer
Uses the information from the applications and decides how to route a data packet on the network
87
Software Defined Network (SDN) - Infrastructure Layer
Contains the network devices that receive information about where to move the data
88
Software Defined Network (SDN) - Management Plane
Used to monitor traffic conditions and the status of the network ● Provides a layer of abstraction between the devices and the control and data flow that happen on the network
89
90
91
92
93
94
95
96
97
98
99
100
101
102