Chapter 4 Virtualization and Cloud Computing Flashcards
Cloud computing invovles:
using virtual machines in commercial data centers to relieve customers of the expense of maintaining a network center
Cloud-based systems allow customers:
to pay for only the services and capacity they use which allows businesses to grow their technology capacity as they need it and avoid high up-front costs
The cloud refers to:
any type of computing that takes place remotely
Infrastructure as a Service (IaaS) enables:
customers to purchase access to data center infrastructure such as storage, network, and networking services
In the IaaS model, the cloud provider covers:
the costs and work involved in equipment, firewall configurations, and other maintenance
One of the key features of IaaS is the:
flexibility it offers to customers who can now just use the virtual resources they need when they need them and not pay for them when they don’t need them
IaaS puts users in charge of:
all the software used in a project, from applications and data to the operating system
The three largest cloud providers are:
Amazon Web Services (AWS)
Microsoft Azure
IBM
Software as a Service (SaaS) refers to:
software that is hosted on servers and accessed through a web browser
Examples of SaaS include:
Google Docs
Microsoft Office 365
FreshBooks
Salesforce
Basecamp
SaaS is designed for organizations that:
need to use a service rather than develop or deploy one
PaaS enables:
vendors to develop and deploy application software in a cloud environment
A developer using PaaS can concentrate on:
software features instead of possible issues with server hardware and operating systems
Some of the major PaaS vendors include:
Oracle Cloud
Google Cloud Platform
Microsoft Azure
Salesforce Platform
Some of the considerations in selecting a PaaS vendor include:
Language and server-side support
Integration with existing investments
Costs
Make sure the PaaS vendor you select supports:
the languages you use for development and the server-side technologies you apps depend on
Some PaaS vendor products can integrate with:
existing apps and data, meaning cloud platforms can work with existing resources instead of requiring them to be replaced entirely
Most PaaS vendors use pricing by:
the hour, but some price by the month
There are four general types of cloud computing. They are:
Public cloud computing
Private cloud computing
Hybrid cloud computing
Community cloud computing
Public cloud computing is available:
to any organization that signs up or pays for it
Private cloud computing is available:
only to authorized users in divisions or departments of a single company
Hybrid cloud computing combines:
features of public and private cloud computing
A typical Hybrid cloud computing installation includes:
dedicated and cloud-based servers and high-speed interconnections with load balancing to move workloads between the environments as needed
Community cloud computing is:
a type of hybrid cloud computing that is used by different organizations that are working together
A community cloud computing model works well for:
organizations that are working together temporarily on a single goal or project and then can dissolve the cloud when the project is finished
There are two main ways to share devices and data over the Internet:
using an internal cloud
using an external cloud
With an internal cloud, the company gets:
the virtualization services and flexibility of a commercial cloud but with the security and reliability that comes from existing within the company’s network infrastructure
An external cloud is a:
cloud solution that exists outside an organization’s physical boundaries
Rapid elasticity refers to:
the ability to rapidly scale up and scale back cloud computing resources as needed
On-demand is a shortened term for:
on-demand self-services
On-demand self-services from SaaS provides are available to:
customers when they need them but do not need to be maintained by the customer when they are not needed
Resource pooling refers to:
the dynamic combination of a service provider’s resources (servers, storage, network connections, and so on) to meet the needs of multiple organizations as demand increases or decreases
Measured service refers to:
how cloud services are monitored for quality and effectiveness
With cloud-based synchronization:
apps on a mobile device send data to the cloud, where it is downloaded by other mobile apps, by web browsers, or by programs running on Windows or macOS
Examples of providers that enable cloud-based synchronization include:
Dropbox
Apple iCloud
Microsoft OneDrive
Google Drive
Data that is synced via cloud-based synchronization is:
used by each side of the connection to verify its identity to the other side
Mutual authentication enables:
a single login to provide access to multiple services
Virtual application streaming of cloud-based applications allows users to:
have more device options for the applications they use
Virtual application streaming stores and runs:
the application in the cloud and delivering the results to the user on any device
To implement virtual application streaming, a client:
purchases a license and downloads a small app that identifies the person as a user
In the virtual application streaming method, the application is presented to:
the user as if it were locally installed, but only the essentials are brought down to the device
Virtual desktop refers to:
a user’s interface to a computer that is hosted in the cloud
When a company uses a vendor’s virtual desktop infrastructure (VDI), users can:
use minimally powered devices with an Internet connection and work as if processing were happening locally
Virtual desktop is known as what? Why?
thin client networking because the processing is centralized, and only mouse and keyboard inputs are sent across the Internet
In order for a VM to interact with other machines it needs to have a:
virtual network interface card (NIC)
A virtual network interface card (NIC) provides a:
physical MAC address
IP address
Administrators can use the virtual machine manager (VMM) to:
assign a specific MAC address
If administrators want the VM to communicate with other machines, they can create:
a path, or bridge between the virtual NIC and the physical NIC on the VMM hardware
Virtualization enables:
a single computer to run two or more operating systems at the same time, using the same hardware resources
A Virtual machine manager (VMM) is:
software that creates and managers virtual machines
A VM is a:
machine created by a hypervisor/VMM that runs like any other computer
Emulation involves:
software-based reproduction of various operating systems but without the functionality and resource use of virtualization
When creating a VM, a VMM/hypervisor sets aside:
memory space that provides access to virtualized storage, ports, video, and other hardware, as well as a hard disk image file known as a virtual hard disk (VHD)
When the VM is created, the user specifies:
the type of OS that will be installed
After the VM starts, the user can:
install the OS from an .iso image file or from physical media
There are two ways that a computer can run a different operating system:
Virtualization
Emulation
In virtualization, the physical resources are:
divided between VMs that can run independently of each other
In emulation, a full reproduction of:
a different OS and different hardware is created by an emulation app, which is then used to run software made for the OS
The categories of virtualization are:
host/guest
hypervisor
server-hosted
client-side virtualization
In host/guest virtualization:
a PC or workstation runs a standard OS and a VMM that runs inside the OS; each VM is a guest OS
Virtual machines enable:
help desktop and support specialists to run older OSs without changing computers and without rebooting their systems
Virtual machines enable a single PC to:
run 32-bit and 64-bit versions of the same OS so that applications that run better in 32-bit mode can be run without the need for a separate computer
The virtual machines on a computer can perform:
different tasks at the same time, enabling more work to be done with less hardware investment
A workstation that will be used for virtualization needs to be designed with:
fast multicore processors and as much RAM as possible, given the limitations of the motherboard and VMM (or host OS)
64-bit operating systems or VMMs are not subject to:
the 4GB RAM limit imposed by 32-bit architecture
If several VMs will be run at the same time on a workstation, the use of:
two or more displays is highly recommended
Why does an emulator require much more RAM and a faster processor than the original hardware being emulated?
Because an emulator must simulate an entire OS and the hardware originally used with the OS
Most VMMs or hypervisors require that:
hardware virtualization be enabled in BIOS/UEFI firmware
Because a single physical computer can house two or more VMs, knowing:
which computers in an organization are using VMs in a vital first step in securing a virtualized environment
Some security issues to consider with virtual networks are:
Monitoring network traffic
Backing up VMs
Updates and patches
Security
Best security practices for VMMs and VMs
A feature known as extensible switch modules enables:
the OS to monitor network traffic between VMs
A VM backup needs to include:
configuration files and virtual disks to ensure that the VM can be restored wherever needed
Virtual machine checkpoints or virtual machine snapshots saves:
the state, data, and hardware configuration of a VM while it is running
VM updates and patches need to be kept current and antivirus software needs to be installed and updated because:
the host machine cannot scan the VMs for viruses
A VMM that enables sandboxing (isolation) of each VM and that provides:
physical partitioning of resources provides better security against attacks
Remote administration should be secured by using:
a VPN
With most VMMs:
wireless network adapters on the host must be bridged to the virtualized wired network adapter to permit the virtual machine to use the wireless adapter
An authentication server is used to:
examine and verify or deny credentials to a use attempting to log into secured networks
The machines that create and manage virtual machines are called:
hypervisors
Type 1 hypervisor-based virtualization is sometimes referred to as:
bare-metal virtualization
In a Type 1 hypervisor-based virtualization that hypervisor itself uses:
few computer resources but more computer resources can be made available to each VM
A Type 2 hypervisor is created on:
a running OS
With a Type 2 hypervisor, guests are:
one level removed from the hardware and therefore run less efficiently than do guests on Type 1 hypervisors
How do you turn on a hypervisor on Window?
Search for “Turn Windows features on or off”
select Turn Windows Features on or off from the menu on the left