4.2 Client-side Virtualization Flashcards

1
Q

Virtualization

A
  • run multiple OS on one computer simultaneously
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Sandboxing

A
  • use of virtualization as an isolated testing environment
  • try some code, nothing is affected
  • roll back to a previous snapshot
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Test Development

A
  • develop and test applications in a virtual environment that is very similar to what the production network might be
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Legacy Software/OS Virtualization

A

Used when:
- running different application versions on the same system
- application only runs on a previous OS version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cross-Platform Virtualization

A
  • running Windows/macOS/Linux simultaneously
  • each OS has strengths and weaknesses
  • no need to partition hard drive
  • no rebooting to switch
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hypervisor

A

Virtual Machine Manager
- manages the virtual platform and guest OS
- may require a CPU that supports virtualization
- manage the CPU, networking, security, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Virtualization Resource Requirements

A

CPU Processor Support
- Intel: Virtualization Technology (VT)
- AMD: AMD-V

A lot of RAM: above and beyond host OS requirements

Plenty of disk space

Network: make sure each OS has proper network configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Virtualization Security Requirements

A
  • VMs should have the same security controls as a physical computer
  • host-based firewall, anti-virus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rogue VMs

A
  • third-party VMs downloaded from the Internet could potentially have malware
  • it’s always best to build your own VM for safety
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

VM Escaping

A
  • malware on a VM gains access to parts of the hypervisor
  • malware can then hop to other virtualized systems managed by that hypervisor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Virtualization Network Requirements

A
  • most client-side VMs have their own virtual network

Network Configurations:
Shared Network Address
- the VM shares the same IP address as the physical host
- uses a private IP address internally
Bridged Network Address
- each VM had its own IP address
Private Address
- no communication outside of the virtual network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

VM Sprawl

A

Occurs when the number of VMs on a network reaches the point where administrators can no longer manage them properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly