Virtualization Concepts Flashcards

OBJ 4.2: Given a scenario, select and install storage devices

1
Q

Host computer installed with a _________ that can be used to install and
manage multiple guest operating systems or virtual machines (VMs)
-Manages the distribution of the physical resources of a server to the VMs

A

hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Runs directly on the host hardware and functions as the
operating system

A

Type I Hypervisor (Bare Metal)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Runs within the normal operating system

A

Type II Hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ensure that each virtual machine runs its own copy of an ______________

A

operating
system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Server-based solution that runs the application on servers
in a centralized location

A

Server-based (Terminal services)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Client-based solution that allows an application to be
packaged up and streamed directly to a user’s PC

A

Client-based (Application streaming)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Type of virtualization applied by a host operating system to provision an
isolated execution environment for an application
● Docker
● Parallels Virtuozzo
● OpenVZ
Each container relies on a common host OS as the base for each
container
-has less resources because it doesn’t
require its own copy of the OS for individual container

A

Containerization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: When a physical server crashes, all the organizations hosted on that same server
are affected

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: An organization’s failure to secure the virtual environments hosted on a shared
server poses a security risk for the other organizations

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Set up virtual servers in the cloud with proper

A

failover, redundancy, and elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hosting all VMs on the same type of hypervisor can also be exploited. How do we mitigate this?

A

● Proper configurations
● Patched and up-to-date hypervisor
● Tight access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

run directly on the host’s hardware to control the hardware and manage guest operating systems. They do not require a base operating system and have direct access to hardware resources

A

Type 1 Hypervisor /bare-metal hypervisors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

run on a host operating system that provides virtualization services. They are installed as applications on the host OS

A

Type 2 Hypervisor/hosted hypervisors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Allows for the full integration of the storage, network, and servers
without hardware changes

A

Hyperconverged Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encapsulates computer programs from the underlying OS on which they
are executed

A

Application Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hosts desktop OSs within a virtualized environment hosted by a
centralized server or server farm

A

Virtual Desktop Infrastructure (VDI)

17
Q

An isolated environment for analyzing pieces of malware
-Separates running processes and programs to mitigate system failures or
software vulnerabilities

18
Q

Allows for the testing and running of software applications for different
operating systems

A

Cross-Platform Virtualization

19
Q

System imitation

20
Q

New “physical” machine

A

Virtualization

21
Q

Improves the performance of virtual memory when running multiple
virtual machines on a single physical host

A

Second Level Address Translation (SLAT)

22
Q

SLAT for Intel

A

Extended Page Table (EPT)

23
Q

SLAT for AMD

A

Rapid Virtualization Indexing (RVI)

24
Q

● 32-bit processor
● 32-bit operating system can only access 4GB of RAM

25
Q

● 16 exabytes of RAM
● 32-bit processor cannot run a 64-bit application

26
Q

Reduced instruction set and computer architecture in a computer
processor

27
Q

▪ Amount of physical memory installed on a physical server

A

System memory

28
Q

System memory space for Windows

A

20-50 gigabytes

29
Q

System memory space for Linux

A

4-8 gigabytes

30
Q

System memory space for Mac

A

20-40 gigabytes

31
Q

allows multiple cards for higher speeds
▪ CPU, processor, and capabilities
▪ System memory
▪ Networking
▪ Storage

A

NIC teaming configuration

32
Q

Threat attempts to get out of an isolated VM and send commands to the
underlying hypervisor
▪ easier to perform on a Type II hypervisor than a Type I
hypervisor
● Patched
● Up to date
-VM to hypervisor or host OS

33
Q

Threat attempts to move from one VM to another on the same host
-VM to VM

A

VM Hopping

34
Q

Occurs when an attacker circumvents sandbox protections to gain access
to the protected OS or other privileged processes
o Patched
o Up to date
o Strong endpoint software protection
o Limited extensions or add-ons

A

Sandbox Escape

35
Q

▪ Migrates the virtual machine from one host to another while it is running
▪ Ensure that live migration only occurs on a trusted network or utilizes
encryption

A

Live Migration

36
Q

Leftover pieces of data that may exist in the hard drive which are no
longer needed
● Encrypt virtual machine storage location
● Destroy encryption key

A

Data Remnants

37
Q

Uncontrolled deployment of virtual machines