Module 28 - Virtualization Security - Q&A Flashcards

1
Q

Which of the following statements best describes a hypervisor?
A. A guest operating system
B. A host virtual machine
C. An application used to create and manage virtual machines
D. A virtual machine that controls other virtual machines

A

C. An application used to create and manage virtual machines is known as a hypervisor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A bare-metal h ypervisor is also referred to as a \_\_\_ _
A. host machine
B. guest machine
C. Type 2 hypervisor
D. Type 1 hypervisor
A

D. A bare metal hypervisor is also referred to as a Type 1 hypervisor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A virtual machine that gets its IP addressing information from the outside network is using a technique called \_\_\_ _
A. bridging
B.NAT
C. routing
D. switching
A

A. A virtual machine that gets its IP addressing information from the outside network is using a technique called bridging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following are security risks that could apply to virtual machines? (Choose all that apply.)
A. Lack of up-to-date patches
B. Non-secure configuration
C. Excessive user privileges
D. Theft of a virtual machine
A

A, B, C, D. All of these are valid threats against virtual machines, which suffer from the same types of threats regarding excessive user privileges, faulty security configurations, and lack of patch management. Additionally, virtual machines can also be stolen, since they are files and can be removed from a facility and re-created elsewhere.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following hardening methods makes more sense on a virtual machine than a physical one?
A. Securing user accounts
B. Backup and encryption of the actual virtual machine disk files
C. Configuring minimal functions with least privileges
D. Patches and security updates

A

B. Backup and encryption of the actual virtual machine disk files is a security measure you can take that is unique to virtualization. There are normally no such files associated with a physical machine. The other choices are appropriate for both virtual and physical machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of the following terms describes the ability to take point-in-time system state captures of a virtual machine?
A. Backups
B. File captures
C. Snapshots
D. Packet captures
A

C. A snapshot is a point-in-time system state capture of a virtual machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following would be considered a contribution to system availability that virtualization can provide?
A. Ability to rapidly replicate physical and virtual machines
B. Ability to secure VM files through encryption
C. Ability to run a separate instance of an operating system on a physical machine
D. Ability to store VM backups securely

A

A. The ability to rapidly replicate physical and virtual machines contributes to system availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Your manager needs you to patch several production servers rapidly due to a critical security vulnerability that has just been published. You know you need to patch them quickly, but you’re concerned that the patch may actually break functionality or security on the production servers. Which of the following strategies would help you to be sure that the patch would not adversely affect production systems?
A. Test the patch on both the production server and identical VM simultaneously and note any issues that occur.
B. Test the patch on a generic virtual machine to see if it causes any issues on theVM.
C. Install the patch on production servers and have a backup ready in case there are adverse effects.
D. Replicate the production servers into a VM, and then test the patch on the replicated virtual machines.

A

D. Replicating the production servers into a VM, and then testing the patch on the replicated virtual machines is the best way to determine if there will be any adverse effects before you put the patch in the production.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following would be the best way to perform a penetration test on a mixed physical and virtual environment?
A. Perform the penetration test on all production machines at the same time.
B. Test only very specific security controls on both physical and virtual production machines.
C. Replicate all production machines (whether physical or virtual) as virtual machines, and perform a penetration test on the replicated VMs.
D. Do not test the virtual machines.

A

C. Replicate all production machines (whether physical or virtual) as virtual machines, and perform a penetration test on the replicated VMs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of the following methods can use virtualization to test untrusted software and potential malware safely?
A. Sandboxing
B. Filtering
C. Containerization
D. VLAN segmentation
A

A. Sandboxing uses virtualization to test untrusted software and potential malware safely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly