Virtualization Concepts Flashcards
OBJ 4.2: Given a scenario, select and install storage devices
Host computer installed with a _________ that can be used to install and
manage multiple guest operating systems or virtual machines (VMs)
-Manages the distribution of the physical resources of a server to the VMs
hypervisor
Runs directly on the host hardware and functions as the
operating system
Type I Hypervisor (Bare Metal)
Runs within the normal operating system
Type II Hypervisor
Ensure that each virtual machine runs its own copy of an ______________
operating
system
Server-based solution that runs the application on servers
in a centralized location
Server-based (Terminal services)
Client-based solution that allows an application to be
packaged up and streamed directly to a user’s PC
Client-based (Application streaming)
Type of virtualization applied by a host operating system to provision an
isolated execution environment for an application
● Docker
● Parallels Virtuozzo
● OpenVZ
Each container relies on a common host OS as the base for each
container
-has less resources because it doesn’t
require its own copy of the OS for individual container
Containerization
True or False: When a physical server crashes, all the organizations hosted on that same server
are affected
True
True or False: An organization’s failure to secure the virtual environments hosted on a shared
server poses a security risk for the other organizations
true
Set up virtual servers in the cloud with proper
failover, redundancy, and elasticity
Hosting all VMs on the same type of hypervisor can also be exploited. How do we mitigate this?
● Proper configurations
● Patched and up-to-date hypervisor
● Tight access control
run directly on the host’s hardware to control the hardware and manage guest operating systems. They do not require a base operating system and have direct access to hardware resources
Type 1 Hypervisor /bare-metal hypervisors
run on a host operating system that provides virtualization services. They are installed as applications on the host OS
Type 2 Hypervisor/hosted hypervisors
Allows for the full integration of the storage, network, and servers
without hardware changes
Hyperconverged Infrastructure
Encapsulates computer programs from the underlying OS on which they
are executed
Application Virtualization
Hosts desktop OSs within a virtualized environment hosted by a
centralized server or server farm
Virtual Desktop Infrastructure (VDI)
An isolated environment for analyzing pieces of malware
-Separates running processes and programs to mitigate system failures or
software vulnerabilities
Sandbox
Allows for the testing and running of software applications for different
operating systems
Cross-Platform Virtualization
System imitation
Emulation
New “physical” machine
Virtualization
Improves the performance of virtual memory when running multiple
virtual machines on a single physical host
Second Level Address Translation (SLAT)
SLAT for Intel
Extended Page Table (EPT)
SLAT for AMD
Rapid Virtualization Indexing (RVI)
● 32-bit processor
● 32-bit operating system can only access 4GB of RAM
x86
● 16 exabytes of RAM
● 32-bit processor cannot run a 64-bit application
x64
Reduced instruction set and computer architecture in a computer
processor
ARM
▪ Amount of physical memory installed on a physical server
System memory
System memory space for Windows
20-50 gigabytes
System memory space for Linux
4-8 gigabytes
System memory space for Mac
20-40 gigabytes
allows multiple cards for higher speeds
▪ CPU, processor, and capabilities
▪ System memory
▪ Networking
▪ Storage
NIC teaming configuration
Threat attempts to get out of an isolated VM and send commands to the
underlying hypervisor
▪ easier to perform on a Type II hypervisor than a Type I
hypervisor
● Patched
● Up to date
-VM to hypervisor or host OS
VM Escape
Threat attempts to move from one VM to another on the same host
-VM to VM
VM Hopping
Occurs when an attacker circumvents sandbox protections to gain access
to the protected OS or other privileged processes
o Patched
o Up to date
o Strong endpoint software protection
o Limited extensions or add-ons
Sandbox Escape
▪ Migrates the virtual machine from one host to another while it is running
▪ Ensure that live migration only occurs on a trusted network or utilizes
encryption
Live Migration
Leftover pieces of data that may exist in the hard drive which are no
longer needed
● Encrypt virtual machine storage location
● Destroy encryption key
Data Remnants
Uncontrolled deployment of virtual machines
VM Sprawl