4.2 Security Requirements Flashcards

1
Q

What is a VM escape?

A

An attack where an attacker breaks out of a virtual machine to access the underlying hypervisor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of hypervisor is more vulnerable to VM escapes?

A

Type 2 hypervisors, as they rely on a host operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can VM escapes be prevented?

A

Regularly update and patch guest OS, host OS, and hypervisor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is VM hopping?

A

An attack where an attacker moves between virtual machines on the same host by exploiting hypervisor vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can VM hopping be mitigated?

A

Securely configure hypervisors, patch vulnerabilities, and enforce isolation between VMs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a sandbox escape?

A

An attack where an attacker bypasses sandbox protections to access the host OS or privileged processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can sandbox escapes be prevented?

A

Keep software updated, use endpoint protection, and limit browser extensions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are live migration risks in virtualization?

A

Virtual machines migrated over a network without encryption can be intercepted by attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can live migration risks be mitigated?

A

Encrypt virtual machine images and restrict migrations to trusted networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are data remnants in virtualization?

A

Residual data left in storage after a virtual machine is deprovisioned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can data remnants be addressed?

A

Encrypt VM storage and destroy encryption keys when deprovisioning VMs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is VM sprawl?

A

The uncontrolled deployment of virtual machines, leading to unmanaged and vulnerable systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can VM sprawl be prevented?

A

Implement change control processes, monitor for unauthorized VMs, and enforce patch management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the primary risk associated with sandbox escapes?

A

Attackers may gain access to the host OS or privileged processes from within a sandbox.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is live migration encryption critical?

A

It prevents attackers from intercepting and tampering with virtual machine data during migration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does proper patch management mitigate VM hopping?

A

It reduces vulnerabilities in the hypervisor and guest OS, preventing attackers from exploiting weak points.