What is a hypervisor?
Software that creates, manages, and allocates resources to virtual machines and controls their interaction with physical hardware.
Hypervisors are essential for virtualization technology.
What is another name for a hypervisor?
Virtual Machine Manager (VMM)
This term emphasizes the hypervisor’s role in managing virtual machines.
What is a Type 1 hypervisor?
A bare-metal hypervisor that runs directly on physical hardware and acts as the primary operating system.
Type 1 hypervisors are typically more efficient than Type 2.
Give examples of Type 1 hypervisors.
These hypervisors are commonly used in enterprise environments.
What is a Type 2 hypervisor?
A hosted hypervisor that runs on top of an existing operating system.
Type 2 hypervisors are generally easier to set up and use.
Give examples of Type 2 hypervisors.
These hypervisors are popular for personal and development use.
What CPU features improve virtualization performance?
Hardware virtualization extensions such as Intel VT-x and AMD-V.
These features allow better management of virtual machines.
What resources does a hypervisor allocate to each VM?
Proper resource allocation is crucial for VM performance.
Why must a host system have sufficient physical resources?
Because all virtual machines share the host’s hardware resources.
Insufficient resources can lead to performance degradation.
What is NAT networking in virtualization?
VMs share the host’s IP address to access external networks.
This method simplifies network configuration.
What is bridged networking?
VMs appear as separate devices on the local network with their own IP addresses.
This allows VMs to interact with other devices on the network.
What is **private (internal-only) networking with VMs?
VMs can only communicate with each other, not external networks.
This setup enhances security by isolating VMs.
What is a VM escape?
A security vulnerability where malware breaks out of one VM and affects other VMs or the host system.
VM escape poses significant security risks.
What security controls should be applied to virtual machines?
These measures help protect VMs from threats.
Why should users be cautious with pre-built virtual machines?
They may contain hidden malware or insecure configurations.
Always verify the source of pre-built VMs.
What is Virtual Desktop Infrastructure (VDI)?
A technology where a user’s desktop runs as a virtual machine on a remote server or in the cloud.
VDI allows centralized management of desktop environments.
What local hardware is required for VDI?
Minimal hardware such as a keyboard, mouse, and display.
VDI reduces the need for powerful local machines.
What is Desktop as a Service (DaaS)?
A cloud-based VDI model where desktop resources are hosted and managed remotely.
DaaS provides flexibility and scalability for organizations.
What is application containerization?
Virtualization that runs applications without requiring a separate guest operating system for each app.
This approach improves resource efficiency.
Why are containers considered lightweight?
They have smaller image sizes and share a single host operating system.
This reduces overhead compared to traditional VMs.
How do containers differ from virtual machines?
Containers share the host OS, while VMs require a full guest OS for each instance.
This distinction affects performance and resource usage.
What is a common container platform?
Docker.
Docker is widely used for developing and deploying containerized applications.
What is a limitation of containers compared to VMs?
Applications must be compatible with the host operating system.
This can restrict the types of applications that can be containerized.