Virtualization Flashcards

1
Q

Virutal Machine Types: a System Virtual Machine

A

replaces entire physical computer

a virtual machine that provides a complete system platform and supports the execution of a complete operating system. P.e. a windows virtual machine that you can run on a mac bc it´s virtual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virtual Machine Types: a Processor Virtual Machine

A

Designed to only run a single process or application like a web browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a hypervisor

Hypervisor: Type I vs. Type II

A

software that creates and runs virtual machines (VMs). A hypervisor allows one host computer to support multiple guest VMs by virtually sharing its resources, such as memory and processing.

Type I:
There is no OS under the hypervisor
AKA: Bare Metal Hypervisor

Type II:
The hypervisor is above the host OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

VM: Container-Based

A

Application Containerization:
A single operating system kernel is shared across multiple virtual machines but each virtual machine receives its own user space for programs and data

Containerization allows for rapid and efficient deployment of distributed applications

Ex: Docker, Parallels Virtuozzo, OpenVZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Virtual Machine attack: Escape

A

An attack that allows an attacker to break out of a normally isolated VM by interacting directly with the hypervisor

Elasticity allows for scaling up or down to meet user demands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Virtual machine attack: Data Remnants

A

you scale up server, don´t need old data anymore, delete files from VM but they are still on physical server which could be attacked from hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Virtual machine attack: Live Migration

A

When a VM is moved from one physical server to another over the network.

Hacker could get in between servers and do man in the middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Securing VMs

A

Uses many of the same security measures as a physical server

Limit connectivity between the virtual machine and the host

Remove any unnecessary pieces of virtual hardware from the virtual machine

Using proper patch management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virtualization Sprawl

A

Occurs when virtual machines are created, used, and deployed without proper management or oversight by the system admins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fog & Fog Computing

A

Fog:
Fog computing is a decentralized computing infrastructure in which data, compute, storage and applications are located somewhere between the data source and the cloud. Like edge computing, fog computing brings the advantages and power of the cloud closer to where data is created and acted upon.

Fog computing:
Distributed cloud architecture - extends the cloud
Private data never leaves (maximizes security)
Long-term analysis can occur in the cloud (internet only when required)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Edge Computing

A

edge computing moves some portion of storage and compute resources out of the central data center and closer to the source of the data itself. Rather than transmitting raw data to a central data center for processing and analysis, that work is instead performed where the data is actually generated

Technology & data for IoT devices occur on the device themselves
No latency, no network requirement
Increased speed/performance
Data is processed where it is, not in the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly