4.2 Summarize aspects of clientside virtualization Flashcards

1
Q

What does virutalization do?

A

Use software to separate environments from each other & the hardware

Software environments like the OS, drivers, & applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do computes run multiple OSs simultaneously?

A

Through virtualiztation, using a hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a hypervisor?

A

Software that allows multiple OSs to run simultaneously on a computer

These OSs would be called guest OSs or virtual machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does a hypervisor prevent conflicts between guest OSs/VMs?

A

By emulating resources & managing hardware access

Emulating resources like CPU, memory, & storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do VMs/guest OSs require for emulated hardware components?

A

Drivers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What limitation might a hypervisor have?

A

The types of guest OSs it can support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

2 ways to implement a hypervisor?

A
  • Guest OS (Type 2)
  • Bare Metal (Type 1)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How is a Guest OS (Type 2) hypervisor implemented?

Examples of Type 2 hypervisors include, VMware Workstation, Oracle VirtualBox, & Parallels Workstation

A

Installed onto a host OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What resources are needed for a Type 2 hypervisor?

A
  • Host OS
  • Hypervisor
  • Guest OS(s)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How is a Bare Metal (Type 1) hypervisor implemented?

Examples of Type 1 hypervisors include VMware ESXi, Microsoft Hyper-V, & Critix XenServer

A

Installed directly on the computer without a host OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What resources are needed for a Type 1 hypervisor?

A
  • Hypervisor
  • Guest OS(s)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does client-side virtualization refer to?

A

Virtualization solutions that run on regular desktops/workstations

Its often used for sandbox, legacy software support, cross-platform virtualization, & training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are 4 uses of client-side virtualization?

A
  • Sandbox
  • Test development
  • Legacy software/OS
  • Cross-platform virtualization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a sandbox used for in client-side virtualizatin?

A

To create an isolated environment to analyze malware

i.e. viruses, worms, & trojans.

As the malware is contained within the guest OS, it can’t infect the researchers computer or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does client-side virtualization support legacy software?

A

By running old OS & software on a VM when the host is upgraded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is cross-platform virtualization used for?

A

Testing software under different OSs &/or resource constraints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is does server-side virtualization refer to?

A

Running a server role as a VM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Main benefit of server-side virtualization for servers & apps?

A

Improves hardware utilization by consolidating servers

This means that multiple virtual servers can run on a single physical server, allowing for more efficient use of hardware resources and reducing the need for multiple physical servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How many virtual servers can usually be run on a server without losing performance?

A

8-9 additional virtual servers

This is because the typical resource utilization of a hardware servier is about 10%, implying that a server computercould be packed with 8-9 server software instances while retaining the same performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does application virtualization allow clients to do?

A

Access/stream apps from a server

This ensures the app is always updated

Examples of application virtualization solutions include Citrix XenApp, Microsoft App-V, & VMware ThinApp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Main benefit of application virtualization for programmers & admins?

A

It ensures the app is always updated with the latest code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Are hypervisors used in container virtualization?

A

No

23
Q

Where are resources isolated in container virtualization?

A

At the OS level

Rather than at the hypervisor level (since hypervisors aren’t used)

24
Q

What resources is allocated to each container in container virtualization?

A

CPU & memory resources

All processes run through the native OS kernel

25
Q

Can containers run guest OSs of different types?

(in container virtualization)

A

No

i.e. you can’t run Windows or Ubuntu in a RedHat Linux container)

26
Q

Can containers run different OS distributions?

(in container virtualization)

A

Yes

This means that containers can use different versions of the same OS

27
Q

What can containers run besides different OS distributions?

(in container virtualization)

A

Separate application processes with their required variables & libraries

For example, you could have one container running a web server application and another container running a database application, each with their own specific settings and dependencies. It’s like packaging an app along with everything it needs to run independently within its own container. This isolation ensures that the application runs consistently across different environments without affecting other applications running on the same system

28
Q

What is a well-known container virtuliazation product?

A

Docker

29
Q

What is conternization used for in mobile devices?

A

To implement corporate workspaces

30
Q

How do containers differ from VMs?

A

Virtualizing the OS & offering lightweight application isolation

VMs virtualize the hardware, creating a full virtual copy of a physical machine with its own OS. This allows running multiple VMs on a single physical machine, each with its own OS & apps. VMs are isolated from each other & provide strong security bounderies.

Containers virtualize the OS, allowing multiple containers to run on a single OS instance. Containers share the host OS kernel but are isolated from each other at the application level. They’re lightweight, start quickly, & consume fewer resources compared to VMs

31
Q

What is Intel’s technology for virtualization called?

A

VT-x (Virtualization Technology)

32
Q

What is AMDs technology for virtualization called?

A

AMD-V

33
Q

Why is Second Level Address Translations (SLAT) important?

A

It improves virtual memory performance with multiple VMs

34
Q

What is Intel’s implementation of SLAT called?

SLAT = Second level Address Translations

A

EPT (Extended Page Table)

35
Q

What is AMD’s implementation of SLAT called?

SLAT = Second level Address Translations

A

RVI (Rapid Virtualization Indexing)

36
Q

What must be enabled in the CPU for optimal virtualization performance?

A

Virtualization support (Intel VT-x or AMD-V) & SLAT

SLAT = Second level Address Translations

37
Q

What to check when choosing a computer for virtualization?

A

ensure CPU supports Intel VT-x or AMD-V & SLAT

Also ensure that they’re enabled

38
Q

How do multiple CPU resources benefit virtualization?

Whether it be through multiple physical processors, multi-core, or Hyperthreading

A

They greatly improve performance

Especiall when running more than 1 guest OS concurrently

39
Q

In virtualization, what’s required for each guest OS’s memory?

A

Sufficient memory beyond what the host OS/hypervisor requires

i.e. if Windows 10 needs atleast 2GB of memory, the virtualization workstation must have atleast 4GB RAM to run the host OS & 1 Windows 10 guest OS. Running multiple guest OSs will quickly increase memory demands. For development & testing, you might get by with less memory since performance is less critical

40
Q

How is a VM’s “hard disk” stored on the host?

A

As an image file

in an enterprise environment, disk images can be stored in a SAN

41
Q

what format do most hypervisors use for VM disk images?

A

A dynamically expanding image format

It grows as files are added to the guest OS

42
Q

Why is more disk space needed for VM snapshots?

A

To save & roll back the VM to a previous state

43
Q

What kind of network can hypervisors create?

A

Virtual network where VMs communicate with each other & the host

This type of network can also connect VMs on different hosts

In enterprise environments, you can configure virtual switches & routers for more complext networking

44
Q

What’s a common solution for patching VMs in most environments?

A

Patching & testing a new template image, then deploying it

A template image is a pre-configured virtual machine image used as a baseline for creating new instances in a virtualized environment. It includes the necessary operating system, software, configurations, and settings for a specific use case. Updating a master VM template with patches and security updates, testing it, and deploying new instances is a common solution for patching VMs in many environments.

45
Q

What are virtualization-specific security solutions?

A

Security apps that run through the host or hypervisor

VMware NSX is an example of a virtualization-specific security solution. VMware NSX is a network virtualization and security platform that offers micro-segmentation to secure traffic between virtual machines. It enables organizations to create application-based security policies and isolate workloads to prevent threat lateral movement.

46
Q

Why wont host antivirus software detect viruses in a guest OS?

A

It doesnt scan the virtual disks of the guest OS

If the virtual disks of a guest OS are scanned, it can cause serious performance problems

47
Q

What is the major security concern with VM template images?

A

The creation of unathorized VMs, known as rogue VMs

Management procedures for developing and deploying VM images need to be strict and monitored. When being developed, VMs should conform to an application-specific template with minimum configuration needed

48
Q

What is VM sprawl?

A

The uncontrolled deployment of more & more VMs

49
Q

How can rogue VMs be detected?

A

via system management software

50
Q

Why should VM images be developed & stored securely?

A

To avoid malware insertion

51
Q

Why is the host a security vulnerabilty in a virtual platform?

A

It acts as a single point of failure

i.e. if the host fails or loses power, all guest OSs & their services will go offline

52
Q

What must be monitored for security vulnerabilities besides the guest OS and host machine?

A

Hypervisor

53
Q

What is virtual machine escaping?

A

Malware on a guest OS jumping to another guest or the host

The hypervisor can be protected from security vulnerabilities by keeping it up to date with patches for critical vulnerabilities