Virtualization and Container Security Flashcards
Which detail differentiates application containers from virtual machines? Choose more than one option.
A. Containers have their own file system
B. Containers do not contain an entire full operating system
C. Containers require a host with special software installed
D. Containers cannot have network listening ports enabled
B. Containers do not contain an entire full operating system: Containers share the host operating system’s kernel, making them more lightweight and efficient than virtual machines.
C. Containers require a host with special software installed: Containers typically run on a host system with containerization software like Docker or Kubernetes installed. This software is responsible for managing and running containers.
In which type of virtualization environment do users connect to a remote desktop using a thing client?
A. Desktop virtualization
B. Cloud computing
C. Application virtualization
D. Operating system virtualization
A. Desktop virtualization.
Desktop virtualization involves hosting virtual desktops on a centralized server. Users can access these virtual desktops remotely using thin clients, which are low-powered devices that rely on the server for processing and storage. This allows users to access their desktop environment and applications from anywhere with an internet connection.
Which operating system component is recommended to be installed prior to installing Docker Desktop on Windows?
A. Web server
B. Group policy
C. RDP
D. WSP
D. WSL (Windows Subsystem for Linux).
Docker Desktop on Windows requires WSL 2 to be installed and enabled in order to function properly. WSL 2 provides a Linux kernel environment that allows Docker to run Linux containers on Windows.
Which Docker CLI command is used to view running containers?
A. docker stop
B. docker ps
C. docker rmi
D. docker images
B. docker ps.
The docker ps command lists all currently running containers.
You need to ensure that Microsoft Hyper-V guests can interact on the physical network. Which type of virtual network switch should you configure?
A. Internal
B. External
C. Public
D. Private
B. External.
An external virtual switch allows virtual machines to communicate directly with physical network devices, enabling them to interact with other devices on the physical network.