Virtualization Flashcards

(14 cards)

1
Q

VM

A

Virtual Machine
Simple files storing virtualized systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hyper visor

A

Windows software that handles creating, running and managing VMs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Host

A

The physical system that handles the resource intensive task of hosting VMs, they’re best driven by dedicated servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Guests

A

Operating systems running on the host machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Kernel

A

The central part of a system, application cell/container for virtualization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Type I HyperV

A

A methodology of virtualization where Guests are driven directly on the hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Type II HyperV

A

A methodology of virtualization where Guests are run within the Host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Snapshots

A

A copy of a VM that can be used as a restorable backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

VDI/VDE

A

Virtual Desktop Infrastructure/ Virtual Desktop Environment
A virtualization of specifically a desktop OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Persistence

A

The capability of saving the unique state of a VDE/VDI to be able to access it later.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Non-persistence

A

The incapability of saving the unique state of a VDE/VDI instead reverting to an older snapshot after use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

VM Escape

A

A vulnerability that allows a threat access to the Host system from within the Virtual system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

VM Sprawl

A

When VMs aren’t properly managed, unaccounted instances become vulnerabilities and consume resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Insider Duplication

A

The vulnerability allowing an insider threat to copy a VM and its database to access on a different Host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly