4.2 Given a scenario, set up and configure client-side virtualization Flashcards
___ provides a way to run many different operating systems on the same desktop.
Client-side virtualization
What are the 4 steps to set up client-side virtualization?
Verify that your system’s hardware can meet the resource requirements needed for a virtual machine.
Install a hypervisor on your local machine.
Configure virtualized hardware for the guest OS.
Last install the guest operating system.
What is a use of client side VMs?
Quickly switching between operating systems.
Using multiple desktops without purchasing new hardware.
What is a use of client side VMs?
Using multiple operating systems
Using multiple desktops
What does a hypervisor do?
Manages the virtual platform and guest operating systems.
What does a hypervisor do?
Manages the virtual platform and guest operating systems.
It’s easy to confuse the terms ___ and ___, but while they may go hand-in-hand, they are two different concepts.
emulation
virtualization
More advanced virtualization systems even allow you to create ___ and have separate VLANs configured for the different virtual machines running on your desktop.
virtual switches
More advanced virtualization systems even allow you to create ___ and have separate VLANs configured for the different virtual machines running on your desktop.
virtual switches
If you’re running an ___, that means that you’re running software that was designed for a completely different hardware platform. One device is effectively pretending to be another. You’re still using the original code from that existing system, but you’re running software that emulates that code on a brand new piece of hardware.
emulator
Explain the difference between emulation and virtualization.
Emulation mimics the behavior of one machine on entirely different machines, allowing things from the emulated machine to run on the host.
Virtualization creates a second operating system on a platform meant to run that operating system.
Just as security is vital in physical computing, it’s also important to think of security when working with virtual machines. This means implementing the same types of security controls on your virtual desktops as you would on your physical ones such as…
strong passwords
host based firewall
antimalware
rogue VMs
Just as security is vital in physical computing, it’s also important to think of security when working with virtual machines. This means implementing the same types of security controls on your virtual desktops as you would on your physical ones such as…
strong passwords
account lock out policies
multi-factor authentication.
In ___mode, the VM is able to communicate directly through the network to which the physical machine is connected.
bridge mode
Having a VM network in ___ mode allows the VM to make outbound connections only.
NAT (network address translation) mode