Section 8: Virtualisation Flashcards

1
Q

What is Virtualisation?

A

Creation of a virtual resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Virtual Machine?

A

A container for an emulated computer that runs an entire OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 2 type of VM’s?

A
  1. System VM
  2. Processor VM
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a System Virtual Machine?

A

A complete platform designed to replace an entire physical computer and includes a full desktop/server OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why does virtualisation continue to rise?

A

In order to reduce the physical requirements for data centres

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do Virtual Machines run on top of?

A

A Hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does a Hypervisor do?

A

Manages the distribution of the physical resources of a host machine (server) to the virtual machines being run (guests)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 2 types of Hypervisors?

A
  1. Type 1 - Bare metal or native
  2. Type 2 - Runs inside a normal machine that uses windows or mac
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some type2 hypervisors?

A
  1. Virtualbox
  2. VMware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why are Type1 hypervisors more efficient than Type2?

A
  1. Faster
  2. doesn’t waste physical computer resources to run OS
  3. stripped down specialised OS providing physical VM
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Application Containerisation?

A

A single OS kernel is shared across multiple virtual machines but each virtual machine receives its own user space for programs and data

  • containerisation allows for rapid and efficient deployment of distributed applications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the most popular Container Based Virtualisation OS

A

Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some container based virtualisations available?

A
  1. Docker
  2. Parallels Virtuoso
  3. OpenVZ
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some unique vulnerabilities related to VMs?

A
  1. VM escape
  2. Data Remnants
  3. Privilege Elevation
  4. Live VM migration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Are VMs separated by other VMs by default?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a VM escape?

A

An attack that allows an attacker to break out of a normally isolated VM by interacting directly with the hypervisor

  • and then can enter another VM on the same machine
  • to mitigate
    • Virtual servers should be hosted on the same physical server as other VMs in the same network or network segment based on its classification
17
Q

Benefits of having Virtualised servers within a cloud environment?

A

Elasticity allows for scaling up or down to meet user demands

  • this can lead to a vulnerability known as Data Remnants
18
Q

What are Data Remnants?

A

Contents of a virtual machine that exist as deleted files on a cloud-based server after deprovisioning of a virtual machine

  • data could be recovered by an attacker which breaches confidentiality
19
Q

What is Privilege Escalation?

A

Occurs when a user is able to grant themselves the ability to run functions as a higher-level user

  • root or admin
  • can be catastrophic or physical server if this is performed on the hypervisor itself
  • VMware used to have this vulnerability where it allowed an attacker to escalate privileges into any of the guest OS hosted by that hypervisor
  • to prevent = update hot fixes and service packs
20
Q

When does Live Migration occur?

A

Live Migration occurs when a VM is moved from one physical server to another over the network

  • attackers can perform MITM attack and capture the data between these 2 servers
21
Q

What happens if the attacker exploits a vulnerability on the OS that is being shared by a container?

A

Anything hosted is exposed to that risk

22
Q

What security measures should you take for your VM?

A

Same as a physical server

  1. updating OS and apps
  2. AV on VM machines
  3. group policies
  4. strong passwords
23
Q

Should you keep your hypervisor up to date?

A

Yes

24
Q

Should you limit connectivity between the VM and the host?

A

Yes

  • isolate the machine from other machines on the hypervisor
25
Q

Should you remove any unnecessary pieces of virtual hardware from the virtual machine?

A

Yes

  • minimises the attack surface
26
Q

Should you consider spreading out VMs on several physical servers to prevent DDoS?

A

Yes

  • using proper patch management you can also keep your guest OS secure
27
Q

What is Virtualisation Sprawl?

A

Occurs when VM are created, used, and deployed without proper management or oversight by the system admins

28
Q

Should you enable encryption on the file that hosts the virtual machine?

A

Yes