Virtualization Concepts 4.2 Flashcards
- Host computer installed with a hypervisor that can be used to install and manage multiple guest operating systems or virtual machines
- the heart of cloud computing
Virtualization
Runs within the normal operating system
Type II Hypervisor
Runs directly on the host hardware and functions as the operating system
Type 1 Hyper (Bare Metal)
_____ solution that allows an application to be packaged up and streamed directly to a user’s PC
Client-based (Application streaming)
______ solution that runs the application on servers in a centralized location
Sever-based (Terminal services)
Manages the distribution of the physical resources of a server to the VMs
Type I (bare metal) & Type II (Hosted)
Encapsulates computer programs from the underlying OS on which they are executed
Application virtualization
Hosts desktop OSs within a virtualized environment hosted by a centralized server or server farm
Virtual Desktop Infrastructure (VDI)
Type of virtualization applied by a host operating system to provision and isolated execution environment for an application
Container-based virtualization (Containerization)
an isolated environment for analyzing pieces of malware
Sandbox
Allow for the testing and running of software applications for different operating systems
Cross-platform virtualization
system imitation
Emulation
new “physical” machine
Virtualization
Improves the performance of virtual memory when running multiple virtual machines on a single physical host
Second level address translation (SLAT)
SLAT for intel is known for
Extended Page Table (EPT)
Reduced instruction set and computer architecture in a computer processor
ARM
SLAT for AMD is known for
Rapid Virtualization Indexing (RVI)
Amount of physical memory installed on a physical server
System memory
____ installation takes 20-50 gigabytes of space
Barebones Windows
__ environment takes 20-40 gigabytes of space
Mac
___ allows multiple cards for higher speeds
NIC teaming configuration
- Threat attempts to get out of an isolated VM and send commands to the underlying hypervisor
- VM to hypervisor or host OS
VM Escape
- Threat attempts to move from one VM to another on the same host
- VM to VM
VM Hopping
VM escape is easier to perform on a ___ than a ___
- Type II hypervisor
- Type I hypervisor
separates running processes and programs to mitigate system failures or software vulnerabilities
Sandbox
Occurs when an attacker circumvents sandbox protections to gain access to the protected OS or other privileged processes
Sandbox Escape
Migrates the virtual machine from one host to another while it’s running
Live migration
Ensure that live migration only occurs on a ___ or utilizes ____
- trusted network
- encryption
Leftover pieces of data that may exist in the hard drive which are no longer needed
Data Remnants
Uncontrolled deployment of virtual machines
VM sprawl
Allows for the full integration of the storage, network, and servers without hardware changes
Hyperconverged infrastructure
32 bit processor and operating system can only access 4 GB of RAM
x86
16 exabytes of RAM and 32 bit processor cannot run an 64 bit application
x64