NIST SP 800-125 Flashcards

1
Q

Virtualization

A

simulation of the software and/or hardware upon which other software runs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

simulated environment

A

called a virtual machine (VM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Forms of virtualization

A

Examples:
1. Full virtualization (server virtualization and desktop virtualization)

  1. Application virtualization, Example Java Virtual Machine (JVM)
  2. Operating system virtualization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Full Virtualization

A

One or more OSs and the applications they contain are run on top of virtual hardware

Each instance of an OS and its applications runs in a separate VM called a guest operating system

Guest OSs on a host are managed by the hypervisor, also called the virtual machine monitor (VMM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Full Virtualization

A

hypervisor provides most of the same hardware interfaces as those provided by the hardware’s physical platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

paravirtualization

A

hypervisor offer interfaces to the guest OS that the guest OS can use instead of the normal hardware interfaces

offer significantly faster access for resources such as hard drives and networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

paravirtualization

A

offer significantly faster access for resources such as hard drives and networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Full virtualization benefits (Pros)

A
operational efficiency (server virtualization) 
desktop virtualization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Full virtualization benefits (Cons)

A

adds layers of technology, which can increase the security management burden by necessitating additional security controls

easy to share information between the systems. can turn out to be an attack vector if it is not carefully controlled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Two forms of full virtualization

A

bare metal virtualization (native virtualization)

hosted virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

bare metal virtualization (native virtualization)

A

the hypervisor runs directly on the underlying hardware, without a host OS; the hypervisor can even be built into the computer’s firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

hosted virtualization

A

the hypervisor runs on top of the host OS

allow users to run applications such as web browsers and email clients alongside the hosted virtualization application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Type of hosted virtualization

A

Hardware emulation (sometimes called hardware translation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

sandboxing

A

Isolating each guest OS from the others and restricting what resources they can access and what privileges they have is also known as sandboxing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

side-channel attacks

A

exploit the physical properties of hardware to reveal information about usage patterns for memory access, CPU use, and other resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

virtualization management system

A

access to the virtualization management system should be restricted to authorized administrators only

17
Q

security recommendations for the hypervisor

A
  1. Install all updates
  2. Restrict administrative access
  3. Synchronize to a trusted authoritative time server
  4. Disconnect unused physical hardware
  5. Disable all hypervisor services such as clipboard- or file-sharing
  6. Consider using introspection capabilities
    Carefully monitor the hypervisor itself for signs of compromise
18
Q

SDLC Phases

A
Phase 1: Initiation
Phase 2: Planning and Design
Phase 3: Implementation
Phase 4: Operations and Maintenance
Phase 5: Disposition