CH08 Virtualization Flashcards

1
Q

What are some of the VM Types ?

A

▪ System Virtual Machine - Complete platform designed to replace an entire physical
computer and includes a full desktop/server operating system

▪ Processor Virtual Machine - Designed to only run a single process or application like a virtualized web browser or a simple web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Hypervisor ?

A

Manages the distribution of the physical resources of a host machine (server) to the virtual machines being run (guests)

Type 1 Hypervisor – bare metal, native. It runs directly on the host hardware and functions as a type of operating system. (Example : Microsoft’s Hyper-V, Citrix’s Xenserver, and VMWare’s ESXi and vSphere)

Guest VM, Guest VM
Hypervisor
Physical Hardware.

Type 2 Hypervisor – runs from within a normal operating system like Windows, Mac, or Linux (Example : VirtualBox, VMWare)

Guest VM, Guest VM
Hypervisor
Host Operating Systems
Physical Hardware

Type 1 is faster and more efficient than a Type 2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Application Containerization ?

A

● A single operating system kernel is shared across multiple virtual machines but each virtual machine receives its own user space for programs and data
● Containerization allows for rapid and efficient deployment of distributed application

Example : Docker, Parallels Virtuozzo, Open VZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is VM Escape ?

A

▪ An attack that allows an attacker to break out of a normally isolated VM by interacting directly with the hypervisor. In this position, the attacker could migrate themselves out, and into another virtual machine being hosted on the same physical server.

To mitigate this vulnerability, virtual servers should be hosted on the same physical server as other virtual machines in the same network or network segment based on its classification.

Containers share a single common operating system. If the attacker’s able to exploit that one operating system through some vulnerability, this causes all of those applications being hosted by that operating system to be at risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Data Remnants ?

A

Contents of a virtual machine that exist as deleted files on a cloud-based server after deprovisioning of a virtual machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Privilege Elevation ?

A

Occurs when a user is able to grant themselves the ability to run functions as a higher-level user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Live migration ?

A

occurs when a VM is moved from one physical server to another
over the network.

If an attacker can gain a foothold on your network and place themselves between these two physical machines, they can implement a form of a main in the middle attack where they can capture the data being sent between the two physical servers. Be sure to encrypt the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Virtualization Sprawl ?

A

Occurs when virtual machines are created, used, and deployed without proper management or oversight by the system admins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly