Virtualization Flashcards

1
Q

is a cloud model in which the virtualization resources purchased by the user are dedicated solely to the use of the user. This ensures the greatest level of security for the user but comes at an increased price as well as less flexibility for the resources.

A

Private cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is a virtualization resource in which the resource is shared across the open internet. This means that the same cloud server that contains a user’s data also contains the data of anyone else who uses that service.

A

Public cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

With a public cloud, you are able to store your data in a separate file within the file cabinet, but the files of thousands of other people are also stored in the same file cabinet. For this reason, a public cloud is not as secure as a private cloud. An example of a public cloud would be Dropbox or iCloud.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is a mixture of the public cloud and the private cloud. A portion of the data is stored in a public cloud while other more sensitive data can be stored in a private cloud.

A

Hybrid cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

offers the security of a private cloud for more sensitive data as well as the flexibility and scalability of a public cloud.

A

Hybrid cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

is a cloud that is shared between a specific set of users. Imagine the file cabinet again. The file cabinet is shared between users, but only a specific set of users can store their data in the file cabinet, increasing security over a public cloud, which allows for anyone to store data in the file cabinet.

A

Community cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

can be thought of as a virtual data center. allow clients to build their entire infrastructure in the cloud. Infrastructure includes items such as servers, firewalls, routers, and switches.

A

Infrastructure as a service (IaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In an IaaS environment, clients are entirely responsible for managing, maintaining, and patching operating systems and applications.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

has become a popular choice for organizations because it allows them to access their programs anywhere an internet connection is available. can be described as any program that is accessed via the web and not locally installed.

A

Software as a Service (SaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

provides a platform for developers to build their own applications. providers will handle everything on the back end, including servers, operating systems, and development tools. This allows developers to focus on creating, building, and managing their applications.

A

Platform as a Service (PaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cloud characteristics are

A

Features available on the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

also known as resource pooling, is the division of the resources of the provider among the clients of that provider. One physical host machine with a lot of resources (memory, storage capacity) can have its resources shared among multiple virtual machines. This resource sharing can occur both internally and externally.

A

Shared resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

refers to the concept of tracking a cloud user’s usage and charging only for the number of services used.

A

Metered utilization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

measured service as when “cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service.”

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

It’s entirely possible (and quite common) for your resource needs to grow as the organization grows. An organization that started with five servers might triple its server needs in several years. Virtualization makes it possible to quickly add new servers as you need them without the hassle of purchasing new hardware each time. This is known as

A

Rapid Elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is the concept of a cloud service being uninterrupted and responsive the majority of the time. Service-level availability or uptime is measured in nines. For example, a provider with three nines of availability has 99.9% uptime while a provider with five nines of availability guarantees 99.999% uptime.

A

High availability

17
Q

is the ability to provide the most recent copy of data on both the cloud and local devices through the synchronization process.

A

File synchronization

18
Q

is a means by which to manage virtual desktops. With a ___ on premises, the virtual machine running the virtual desktops is located on the physical premises of the entity using it. removes the physical hardware of a network, such as switches, cables, and NICs, and replaces them with virtual hardware contained on a single machine located at the site.

A

virtual desktop infrastructure (VDI)

19
Q

removes the virtual machine from the physical premises and places it in the cloud environment run through cloud providers. This eliminates the responsibility of the user for the physical hardware running the VDI.

A

VDI in the cloud

20
Q

is the process of running the virtual environment on a device physically located on the premises. The virtualization software is run on the client machine rather than through the cloud. The client device hosts the hypervisor and is responsible for accommodating the necessary requirements to run the virtual machine.

A

Client-side virtualization

21
Q

Considerations for client-side virtualization include CPU, RAM, hard drive space, and network capabilities.

A

True

22
Q

is designed to remove the one-to-one hardware and software barrier and maximize available resources. can be used to run multiple OSs on a single device or can pool resources from multiple servers into a single powerful system. can also be used to protect the host system by separating the virtual machines from one another.

A

A Virtual machine

23
Q

is a temporary, isolated virtual environment that can be used for testing or quarantining.

A

A sandbox

24
Q

A sandbox creates a safe environment separated virtually from the host machine to eliminate the potential contamination of the host machine. Data in the sandbox is only in the sandbox and does not save to the host. When the sandbox is terminated, all data associated with the sandbox is also removed.

A

True

25
Q

Virtual machines can be used for test development by creating virtual environments and OSs that can be used for application testing or development.

A

True

26
Q

is the virtualization of applications. is often used with legacy software or legacy OS to offer the functionality of the legacy application. is also used for cross-platform functionality. For example, an application designed for a macOS can be used on a Windows machine by creating a virtual macOS on the Windows machine.

A

Application virtualization

27
Q

Not all virtual machines are created equal. The individual that is building the virtual machine determines what resources to provide to the virtual machine. This means determining the amount of hard drive space and the amount of memory that your local machine can afford to give the virtual machine. If your physical machine doesn’t have a lot of RAM, then you will not be able to provide enough RAM for your virtual machine to run smoothly.

A

True

28
Q

Just as security is vital in physical computing, it’s also important to consider security when working with virtual machines. This means implementing the same types of security controls on your virtual desktops as you would on your physical ones, such as strong passwords, account lockout policies, and even multi-factor authentication.

A

True