Section 8: Virtualization Flashcards

1
Q

Virtualization

A

Creation of a virtual resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virtual Machine

A

a container for an emulated computer that runs an entire operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

System Virtual Machine

A

Entire OS being run virtually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Processer Virtual Machine

A

An application being run virtually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hypervisor

A

Manages the distro of physcial resources of a host machine (server) to the virtual machines being run (guests)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Type 1 Hypervisor

A

Bare metal or native; runs directly on the hardware (ESXi, hyper v, etc.) (more efficient than type 2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Type 2 Hypervisor

A

Runs on the OS (Virtualbox, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Third type of Hypervisor that’s becoming popular

A

Application Containerization - A single operating system kernel is shared across multiple virtual machines but each virtual machine received its own user space for programs and data (Docker)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

VM Escape

A

An attack that allows an attacker to break out of a normally isolated VM by interacting with the hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Remnants

A

Contents of a virtual machine that exist as deleted files on a cloud based server after deprovisioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Privilege Elevation

A

Occurs when a user is able to grant themselves the ability to run functions as higher level user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do you secure a VM?

A

keep it up to date

have antivirus on it

limit connectivity between the virtual machine and the host

remove any unnecessary pieces of virtual hardware from the virtual machine

using proper patch management is important to keeping your guest’s operating system secure

enable file encryption of the vm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following vulnerabilities involves leveraging access from a single virtual machine to other machines on a hypervisor?

A

VM Escape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly