4.0 Virtualization and Cloud Computing Flashcards
As defined by NIST, What are the 5 elements cloud computing services must have ?
On-demand self-service
Broad network access
Resource pooling
Rapid elasticity
Measured service
What is a disadvantage of a Type 2 hypervisor ?
Type 2 Hypervisor will sit on top the existing OS hence both OS’s will compete for resources.
What is a Sandbox ?
Temp OS enviroment.
What is a sandbox ideal for ?
Testing softeare
What should you do if you receive a mesage that states that a network card MAC address conflict exists ?
Remove the Network Interface Card (NIC) and configure another one.
Define on-demand for cloud computing
Storing files in the cloud when necessary and removing when space is freed up,
What are the two forms of application virtualization ?
Cross platform virtualization and Virtualization legacy software.
Define rapid elasticity ?
Obtaining resources at a moments notice.
What is a community cloud ?
Multiple organization from a community have share interests and hence share the cloud infastructure
Will load balancing be specific or general ?
Specific i.e. server block 1 handles task A, block 2 task B etc.
Where can a antispam gateway be located ?
Multipleplace, on the cloud or on an internal network
A type 1 hypervisor is also known as ?
Bare-metal hypervisor
What tech provides and manages virtual desktops ?
Virtual desktop infastructure
What is metered utilization?
The process by which a provider charges for resources used.
Which cloud term refers to the process by which a provider charges for the resources used?
Metered Utilization
Where should you deploy a virtual image to test vunerablities ?
Sandbox enviroment
What are the two main things you need to include for a dedicated virtualization workstation ?
Max RAM and Multiple CPU cores
What can be a security concern wehn using acloud service providerand could result in a data breach caused by data remnants?
Rapid Elasticity
Resources may not be deprovisioned properly
Which of the following is the MOST dangerous type of threat when using virtualization?
VM escape
What is VM escape ?
Malware running on a guest OS jumping to another guest or the host
Lowest layer of a bare metal-V enviroment ?
Physical hardware