Virtualizatrion Concepts Flashcards

OBJ 4:2 Given a scenario, select and install storage devices

1
Q

Virtualization

A

host computer installed with a hypervisor that can be used to install and manage multiple guest operating systems or virtual machines. (VMs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Type 1 Hypervisor

A

Type I Hypervisor (Bare Metal)
Runs directly on the host hardware and functions as the
operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Type II Hypervisor

A

Runs within the normal operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Virtualization

A

Ensure that each virtual machine runs its own copy of an operating
system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Server-based (Terminal services)

A

Server-based solution that runs the application on servers
in a centralized location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Client-based (Application streaming)

A

Client-based solution that allows an application to be
packaged up and streamed directly to a user’s PC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Containerization

A

Type of virtualization applied by a host operating system to provision an
isolated execution environment for an application
● Docker
● Parallels Virtuozzo
● OpenVZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Containerization Vulnerabilities 1

A

When a physical server crashes, all the organizations hosted on that same server are affected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Containerization Vulnerabilities 2

A

An organization’s failure to secure the virtual environments hosted on a shared
server poses a security risk for the other organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How to minimize risk to physical servers from being overwhelmed?

A

Set up virtual servers in the cloud with proper failover, redundancy, and
elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What can be another vulnerability to VMs from attackers?

A

Hosting all VMs on the same type of hypervisor can also be exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

how to mitigate the risk associated with using the same type hypervisor?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How should an organization minimize the risk of attack when using a single platform hypervisor?

A

The organization should utilize -
● Proper configurations
● Patched and up-to-date hypervisor
● Tight access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of hypervisors?

A

Manages the distribution of the physical resources of a server to the VMs
● Type I
o Bare metal
● Type II
o Hosted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of Container Based Virtualization (Containerization)

A

▪ Each container relies on a common host OS as the base for each
container
▪ Container-based virtualization has less resources because it doesn’t
require its own copy of the OS for individual container

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Purpose for Hyperconverged Infrastructure?

A

Allows for the full integration of the storage, network, and servers
without hardware changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Purpose for Application Virtualization?

A

Encapsulates computer programs from the underlying OS on which they
are executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Purpose for Virtual Desktop Infrastructure (VDI)

A

Hosts desktop OSs within a virtualized environment hosted by a
centralized server or server farm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Purpose for Sandbox?

A

An isolated environment for analyzing pieces of malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Purpose for Cross-Platform Virtualization?

A

Allows for the testing and running of software applications for different
operating systems
● Emulation - System imitation
● Virtualization - New “physical” machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Questions to ask when considering VM?

A

Should I virtualize?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Questions ? Traditional VMs, or Containerization?

A

What are the risk vs rewards towards each decision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Hypervisor

A

Manages the distribution of the physical resources of a server to the VMs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Type I Hypervisor

A

Bare metal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Type II Hypervisor

A

Hosted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Container-Based Virtualization (Containerization)

A

▪ Each container relies on a common host OS as the base for each
container
▪ Container-based virtualization has less resources because it doesn’t
require its own copy of the OS for individual container

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Hyperconverged Infrastructure

A

Allows for the full integration of the storage, network, and servers
without hardware changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Application Virtualization

A

Encapsulates computer programs from the underlying OS on which they
are executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Virtual Desktop Infrastructure (VDI)

A

Hosts desktop OSs within a virtualized environment hosted by a
centralized server or server farm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Sandbox

A

An isolated environment for analyzing pieces of malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Cross-Platform Virtualization

A

Allows for the testing and running of software applications for different
operating systems
● Emulation - System imitation
● Virtualization - New “physical” machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Resource Requirements

A

Focus on four main areas - CPU and Virtualization Extensions, Storage, System Memory, and Networking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Resource Requirements - Second Level Address Translation (SLAT)

A

Improves the performance of virtual memory when running multiple
virtual machines on a single physical host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Resource Requirements - Second Level Address Translation (SLAT) - Intel

A

Extended Page Table (EPT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Resource Requirements - Second Level Address Translation (SLAT) - AMD

A

Rapid Virtualization Indexing (RVI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Resource Requirements - CPU - x86

A

32-bit processor
32-bit operating system can only access 4GB of RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Resource Requirements - CPU - x64

A

16 exabytes of RAM
32-bit processor cannot run a 64-bit application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Resource Requirements - CPU - ARM

A

Reduced instruction set and computer architecture in a computer
processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Resource Requirements - System Memory

A

Amount of physical memory installed on a physical server
Barebones Windows installation takes 20-50 gigabytes of space
Linux installation takes 4-8 gigabytes of space
Mac environment takes 20-40 gigabytes of space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Resource Requirements - Networking - NIC teaming configuration allows multiple cards for higher speeds

A

CPU, processor, and capabilities
System memory
Networking
Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Security Requirements VM Escape

A

Threat attempts to get out of an isolated VM and send commands to the
underlying hypervisor
▪ VM escape is easier to perform on a Type II hypervisor than a Type I
hypervisor
Verified always Patched
Verify always Up to date

42
Q

Security Requirements VM Hopping

A

Threat attempts to move from one VM to another on the same host

43
Q

Security Requirements VM Hopping

A

VM to VM

44
Q

Security Requirements VM Escape

A

VM to hypervisor or host OS
▪ Up to date
▪ Patched
▪ Securely configured

45
Q

Security Requirements Sandbox

A

Separates running processes and programs to mitigate system failures or
software vulnerabilities

46
Q

Security Requirements Sandbox Escape

A

Occurs when an attacker circumvents sandbox protections to gain access
to the protected OS or other privileged processes
o Patched
o Up to date
o Strong endpoint software protection
o Limited extensions or add-ons

47
Q

Security Requirements Live Migration

A

Migrates the virtual machine from one host to another while it is running
▪ Ensure that live migration only occurs on a trusted network or utilizes
encryption

48
Q

Security Requirements Data Remnants

A

Leftover pieces of data that may exist in the hard drive which are no
longer needed
● Encrypt virtual machine storage location
● Destroy encryption key

49
Q

Security Requirements VM Sprawl

A

VM Sprawl

50
Q

NIC Teaming Configuration

A

Allows multiple cards for higher speeds

51
Q

Cloud Computing

A

The practice of using a network of remote servers hosted on the Internet

52
Q

Characteristics of the Cloud - High Availability

A

Services experience very little downtime when using the cloud
▪ Availability is the percentage of uptime versus downtime

53
Q

Characteristics of the Cloud - Scalability

A

Ability to increase the number of items in a system at a linear rate or less
than a linear rate

54
Q

Characteristics of the Cloud - Vertical Scaling (Scaling Up)

A

Increasing the power of the existing resources in the working
environment

55
Q

Characteristics of the Cloud - Horizontal Scaling (Scaling Out)

A

Adding additional resources to help handle the extra load being
experienced

56
Q

Characteristics of the Cloud - Rapid Elasticity

A

The ability to quickly scale up or down
● Elasticity is the system’s ability to handle changes to demand in
real time

57
Q

Characteristics of the Cloud - Metered Utilization

A

Being charged for a service on a pay per use basis.
The benefit of using the cloud is that most things are done on a metered
basis.

58
Q

Characteristics of the Cloud - Measured Services

A

▪ Charging is based upon the actual usage of the service being consumed
▪ Measured services are charged based on the actual usage of the service
being consumed

59
Q

Characteristics of the Cloud - Shared Resources

A

The ability to minimize the costs by putting VMs on other servers.
▪ Shared resources is pooling together all the hardware to make a cloud provider.

60
Q

Characteristics of the Cloud - File Synchronization

A

The ability to store data that can spread to other places depending on the configuration.

61
Q

Cloud Deployment Models -Public Cloud

A

Systems and users interact with devices on public networks, such as the
Internet and other clouds

62
Q

Cloud Deployment Models -Public Cloud

A

Systems and users interact with devices on public networks, such as the
Internet and other clouds

63
Q

Cloud Deployment Models -Public Cloud

A

Systems and users interact with devices on public networks, such as the
Internet and other clouds

64
Q

Cloud Deployment Models - Private Cloud

A

Systems and users that only have access with other devices inside the
same private cloud or system

65
Q

Cloud Deployment Models - Hybrid Cloud

A

Combination of private and public clouds

66
Q

Cloud Deployment Models - Community Cloud

A

Collaborative effort where infrastructure is shared between several
organizations from a specific community with common concerns

67
Q

Cloud Deployment Models - Multitenancy

A

The ability for customers to share computing resources in a public or
private cloud

68
Q

Cloud Deployment Models - Single-Tenancy

A

Assigns a particular resource to a single organization

69
Q

Cloud Service Models - On-Premise Solution

A

▪ The need to procure hardware, software, and personnel necessary to run
the organization’s cloud
▪ On-premise solution allows the ability to control all the physical and
logical access to servers

70
Q

Cloud Service Models - Hosted Solution

A

Third-party service provider that provides all the hardware and facilities
needed to maintain a cloud solution

71
Q

Cloud Service Models

A

On-Premise, SaaS, PaaS, IaaS

72
Q

On- Premise Cloud Model

A

On-premise software is installed locally, on your business’ computers and servers, where cloud software is hosted on the vendor’s server and accessed via a web browser.

73
Q

SaaS Cloud Model

A

Software as a Service - Software as a Service (SaaS) is a method for delivering software applications over the Internet, on demand and typically on a subscription basis. With SaaS, Cloud Service Providers (CSPs) host and manage the application software and underlying infrastructure, and handle any maintenance, like software upgrades and security patching. Users connect to the application over the Internet, usually by a web browser on their phone, tablet, or PC.

74
Q

PaaS Cloud Model

A

Platform as a Service - a cloud computing services that supply an on-demand environment for developing, testing, delivering, and managing software applications. PaaS is designed to make it easier for developers to quickly create applications (e.g., web, mobile apps), without worrying about setting up or managing the underlying infrastructure of servers, storage, network, and databases needed for development.

75
Q

IaaS Cloud Model

A

Infrastructure as a Service - The most basic category of commercial cloud computing services. With Infrastructure as a Service (IaaS), you rent IT infrastructure - servers and virtual machines (VMs), storage, networks, operating systems - from a cloud provider.
IaaS is an instant computing infrastructure, provisioned and managed over the Internet. Quickly scale up and down with demand, and pay only for what you use.
IaaS helps you avoid the expense and complexity of buying and managing your own physical servers and other datacenter infrastructure. Each resource is offered as a separate commercial service component, and you only need to rent a particular one for as long as you need it. The cloud computing service provider manages the infrastructure, while you purchase, install, configure, and manage your own software - operating systems, middleware, and applications.

76
Q

Virtual Desktop Infrastructure (VDI) -Virtual Desktop Infrastructure (VDI)

A

Hosts desktop OSs within a virtualized environment hosted by a
centralized server or server farm

77
Q

Virtual Desktop Infrastructure (VDI) - Server

A

Performs all the application processing and data storage

78
Q

Virtual Desktop Infrastructure (VDI) - Centralized Model

A

Hosts all the desktop instances on a single server or server farm

79
Q

Virtual Desktop Infrastructure (VDI) - Hosted Model/ Desktop as a Service (DAAS)

A

Maintained by a service provider and provided to the end user as a
service

80
Q

Virtual Desktop Infrastructure (VDI) - Remote Virtual Desktop Model

A

Copies the desktop image to a local machine prior to being used by the
end user

81
Q

Cloud Storage Services - Cloud Storage Application

A

Amount of space on a cloud-based server as file storage

82
Q

Cloud Storage Services - File Synchronization

A

The ability to synchronize from different devices using a single account

83
Q

Cloud Storage Services - Content Delivery Network (CDN)

A

Network of servers that locates the nearest server to minimize delay or
download time

84
Q

Software Defined Network (SDN)- Software

A

Software-Defined Networking (SDN)
▪ Enables the network to be intelligently and centrally controlled, or
programmed, using software applications
● Can be changed automatically by the network itself using
automation and orchestration

85
Q

● Software Defined Network (SDN) - Application Layer

A

Focuses on the communication resource requests or information about
the network as a whole

86
Q

Software Defined Network (SDN) - Control Layer

A

Uses the information from the applications and decides how to route a
data packet on the network

87
Q

Software Defined Network (SDN) - Infrastructure Layer

A

Contains the network devices that receive information about where to
move the data

88
Q

Software Defined Network (SDN) - Management Plane

A

Used to monitor traffic conditions and the status of the network
● Provides a layer of abstraction between the devices and the
control and data flow that happen on the network

89
Q
A
90
Q
A
91
Q
A
92
Q
A
93
Q
A
94
Q
A
95
Q
A
96
Q
A
97
Q
A
98
Q
A
99
Q
A
100
Q
A
101
Q
A
102
Q
A