Virtualization Concepts Flashcards
What is virtualization?
Virtualization uses a single physical host to run multiple virtual machines (VMs) or guest operating systems via a hypervisor, which allocates resources like CPU, memory, and storage.
What are the types of hypervisors and their examples?
• Type 1 (Bare Metal): Runs directly on hardware. Examples: Hyper-V, ESXi, XenServer.
• Type 2 (Hosted): Runs on a host OS. Examples: VMware Workstation, VirtualBox.
What are the benefits of virtualization?
• Resource Efficiency: Reduces need for additional physical servers.
• Flexibility: Multiple OSes on one machine for testing or tasks.
• Management: Hypervisor efficiently allocates resources.
What are key security considerations for virtualization?
• Each VM requires independent updates and security configurations.
• Proper management of hypervisor and VM access is critical to prevent breaches.
What is containerization?
Containerization uses the host OS kernel to run isolated applications without separate OS instances, offering more efficient resource usage. Examples: Docker, Kubernetes.
What are the benefits of containerization?
• Resource Efficiency: Containers share the host OS, reducing storage needs.
• Isolation: Containers are isolated, adding a security layer.
What are the main security risks in virtualization?
• VM Escape: When an attacker bypasses VM isolation to access the hypervisor.
• VM Hopping: Moving between VMs in the same host environment.
What are the risks with hypervisor vulnerabilities?
Exploits in hypervisors can lead to widespread exposure if the platform is compromised. Regular patching and using multiple hypervisors can reduce risk.
What are the resource requirements for virtualization?
• CPU: Virtualization extensions (Intel VT-x or AMD-V) are required for optimal performance.
• RAM: Allocate sufficient memory for both the host OS and VMs (e.g., 4-8 GB for each VM).
• Storage: VMs need space for OS and files (20-50 GB per VM).
How do you prevent VM escape?
• Regularly update guest OS, host OS, and hypervisors.
• Use trusted hypervisors and avoid outdated software.
What is the risk of live migration in virtualization?
If migration occurs over an unencrypted network, sensitive data can be exposed.
Prevention: Encrypt migration traffic and ensure secure networks.
How do you configure a Windows 10 VM in VirtualBox?
- Download a Windows 10 VM from Microsoft’s website.
- Extract and import the OVF file into VirtualBox.
- Configure resources like CPU and RAM.
- Start the VM and log in with default credentials.
How do you secure a VM by encrypting its disk?
- Open VirtualBox and go to Settings > General tab > Disk Encryption.
- Enable encryption with a strong cipher (AES-256).
- Set a strong password to protect the VM data.
Why should you disable shared folders in VirtualBox?
Shared folders could transfer viruses between the host and VM.
Prevention: Remove shared folders unless necessary, and use read-only mode if needed.