chapter 9 Flashcards
The "ability to run multiple operating systems on a single physical system and share the underlying hardware resources" is referred to as: A. cloud computing B. grid computing C. agile computing D. virtualization E. all of the above
D. virtualization
Which of the following is a characteristic of virtualization?
A. single OS image per machine
B. hardware-independence of operating system and applications
C. inflexible, costly infrastructure
D. software and hardware are tightly coupled
E. running multiple applications on the same machine often creates conflict
B. hardware-independence of operating system and applications
Which of the following layers can be virtualized? A. hardware-level virutalization B. operating system-level vituralization C. high-level language virtual machines D. both A and B only E. all of the above
E. all of the above
Which of the following are characteristics of a hosted architecture?
A. service console for agents and helper applications
B. installs and runs as an application
C. relies on host OS for device support and physical resource management
D. lean virtualization-centric kernet
E. both B and C
E. both B and C
The dynamic mapping of resources to a business/organization is referred to as: A. aggregated resources B. computer resources C. virtual infrastructure D. infrastructure E. service infrastructure
C. virtual infrastructure
A “representation of a real machine using software that provides an operating environment which can
run/host a guest operating system” is known as a(n):
A. operating system
B. virtualized environment
C. virtual infrastructure
D. virtual machine
E. hypervisor
D. virtual machine
A "thin layer of software that provides virtual partitioning capabilities which runs directly on hardware and underneath higher-level virtualization services" is known as a(n): A. hosted virtual machine B. virtual machine C. hosted infrastructure D. para-virtual machine E. hypervisor
E. hypervisor
In enterprise data centers, servers can have utilization rates as low as: A. less than 5% B. between 5 to 15% C. 20% D. 25% E. between 25 to 35%
B. between 5 to 15%
What is the primary threat to virtualized systems?
A. Loss of separation of duties for network and security controls.
B. Remote exploitation by malware.
C. Lack of visibility and controls.
D. Insufficient separation on the physical server.
E. Insecure virtualization layers compromise all hosted workloads.
B. Remote exploitation by malware.
Which of the following are limitations to a virtual-security-appliance solution? A. only IDS/IPS protection from attacks B. non-transparency C. mobility D. inter-VM traffic E. B, C and D only
E. B, C and D only
According to Trend Micro, an integrated approach to virtualization security involves ___ aspects.
A. three B. four C. five D. six E. ten
D. six
According to Trend Micro, an integrated approach to virtualization security involves all of the following aspects, EXCEPT: A. software licensing models B. intrusion detection C. multiple virtualization architectures D. risk auditing E. enterprise management
D. risk auditing
Host-based intrusion detection and prevention includes all of the following, EXCEPT:
A. network traffic analysis and filtering
B. log analysis
C. management scalability
D. network configuration and monitoring
E. code analysis
C. management scalability
The CSA (Cloud Security Alliance) concentrates on which form of virtualization? A. operating system virtualization B. hypervisored virtualization C. presentation virtualization D. application virutalization E. virtual machine virtualization
A. operating system virtualization
Which of the following are examples of operating system virtualization? A. Virtual Iron B. Citrix Presentation Server C. Virtuozzo D. VMware E. Microsoft SoftGrid
C. Virtuozzo