Virtualization Services Flashcards

(49 cards)

1
Q

What is a hypervisor?

A

Software that manages the interaction between virtual machines and the physical hardware they run on. Also called a Virtual Machine Manager (VMM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does a hypervisor allocate to each virtual machine?

A

CPU cycles, memory, networking and storage. Keeping all resources separated between the different VMs running on the same physical hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Type 1 hypervisor?

A

A hypervisor that runs directly on top of physical hardware with no underlying operating system. Also called a bare metal hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are two examples of Type 1 hypervisors?

A

VMware ESXi and Microsoft Hyper-V

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is a Type 1 hypervisor called a bare metal hypervisor?

A

Because it runs directly on the hardware with no OS beneath it. The hypervisor itself effectively serves as the primary operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Type 2 hypervisor?

A

A hypervisor that runs on top of an existing host operating system. Also called a hosted hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are three examples of Type 2 hypervisors?

A

VMware Workstation, Oracle VirtualBox and Parallels Desktop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the key difference between a Type 1 and Type 2 hypervisor?

A

Type 1 runs directly on bare metal hardware with no OS underneath. Type 2 runs on top of an existing host OS. The VMs themselves are identical in both cases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Intel’s CPU virtualization technology called?

A

Virtualization Technology, abbreviated as VT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is AMD’s CPU virtualization technology called?

A

AMD-V

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why do VMs require significant hardware resources?

A

Each VM contains a complete installed OS, applications and data. All VMs share the physical CPU, RAM and storage so sufficient resources must be available for all VMs running simultaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three main virtual network configuration options for VMs?

A
  • Shared (NAT) - hypervisor subnet with NAT to external network
  • Bridge - VM acts as full local network member with its own IP
  • Private - VM can only communicate with itself and selected devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a bridge network address in virtualization?

A

A configuration where the VM acts as a regular device on the local network. No NAT, same IP subnet as the physical network and full network access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a shared network address in virtualization?

A

The hypervisor assigns VMs their own internal subnet and performs network address translation when those VMs need to communicate with the external physical network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a private network address in virtualization?

A

A configuration that isolates the VM completely. It can only communicate with itself and any devices specifically configured to communicate with it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a VM escape?

A

A security vulnerability where malware on one VM exploits a flaw in the hypervisor to break out of isolation and communicate with or access data on other VMs on the same host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why is downloading VMs from the internet a security risk?

A

Malware authors can embed malware inside a published VM. When you run that VM you are running an already-infected operating system on your own system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Virtual Desktop Infrastructure (VDI)?

A

A technology where the entire desktop OS runs as a VM on a remote server or in the cloud. The local device only needs a keyboard, mouse and display

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is another name for VDI when delivered as a cloud service?

A

Desktop as a Service (DaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the hardware advantages of VDI for the local device?

A

The local device requires minimal CPU, memory and storage because all processing happens on the remote virtualized system. Only network connectivity and a display are needed

21
Q

What is application containerization?

A

A virtualization method where individual applications run in isolated self-contained containers on a single host OS without each needing its own full guest operating system

22
Q

What is the most popular containerization software?

23
Q

What are the main advantages of containers over traditional VMs?

A

Containers are much smaller and more lightweight (no guest OS overhead), faster to transfer and more portable. They can be moved between physical devices without modification

24
Q

What is a key limitation of application containers compared to VMs?

A

Containers rely on the host OS. You generally cannot run Windows, Linux and Mac OS containers simultaneously on the same containerization platform

25
How many operating systems need patching in a containerized environment vs a VM environment?
Only one in a containerized environment (the single host OS). In a VM environment each guest OS must be individually patched and maintained
26
What overhead do VMs have that containers do not?
Each VM requires a full guest operating system installation. Containers share the host OS eliminating that overhead making them significantly smaller and faster to deploy
27
True or False: A Type 1 hypervisor runs on top of an existing desktop operating system.
False. A Type 1 (bare metal) hypervisor runs directly on the hardware with no OS underneath. A Type 2 hypervisor runs on top of a host OS
28
True or False: VMware Workstation is an example of a Type 1 hypervisor.
False. VMware Workstation is a Type 2 (hosted) hypervisor. VMware ESXi is the Type 1 example
29
True or False: The VMs running on a Type 1 and Type 2 hypervisor are fundamentally different.
False. The VMs themselves are identical. The only difference is whether the hypervisor runs on bare metal or on top of a host OS
30
True or False: Intel's CPU virtualization support is called AMD-V.
False. Intel's is called VT (Virtualization Technology). AMD's equivalent is called AMD-V
31
True or False: A bridge network configuration performs NAT to connect VMs to the external network.
False. A bridge configuration gives the VM a direct presence on the local network with no NAT. NAT is used in the shared network configuration
32
True or False: A VM escape allows malware on one VM to access other VMs on the same hypervisor.
True. A VM escape exploits a hypervisor flaw to break isolation between VMs
33
True or False: Each VM requires its own security configuration including firewall and anti-malware.
True. Each VM is its own complete OS and must be secured just like a standalone workstation or server
34
True or False: VDI requires a powerful local workstation to process the desktop environment.
False. In VDI all processing happens on the remote virtual system. The local device only needs minimal hardware plus a network connection and display
35
True or False: DaaS (Desktop as a Service) is another term for Virtual Desktop Infrastructure.
True. DaaS refers to VDI delivered as a cloud service
36
True or False: Application containers each contain their own full guest operating system.
False. Containers share the host OS and contain only the application and its dependencies. There is no guest OS per container
37
True or False: Docker is a popular containerization platform.
True
38
True or False: Containers are generally more portable than traditional VMs.
True. Containers are smaller, lightweight and can be moved between physical devices without modification
39
True or False: In a containerized environment each container must have its OS individually patched.
False. Containers share the single host OS meaning only one OS needs to be patched and maintained
40
True or False: You can freely mix Windows, Linux and Mac OS containers on the same Docker instance.
False. Containers depend on the host OS and generally must be configured to run on that specific OS type
41
Scenario: A company needs to run dozens of VMs on a dedicated server with no desktop interface. Which hypervisor type?
A Type 1 (bare metal) hypervisor such as VMware ESXi or Microsoft Hyper-V. It runs directly on hardware with no OS overhead for maximum efficiency
42
Scenario: A developer wants to run a Windows VM on their personal MacOS laptop for occasional testing. Which hypervisor type?
A Type 2 (hosted) hypervisor such as VMware Workstation, Oracle VirtualBox or Parallels Desktop. It runs on top of the existing Mac OS host
43
Scenario: Malware on one corporate VM may be trying to access other VMs on the same host. What specific threat is this?
A VM escape. A vulnerability where malware exploits a hypervisor flaw to break out of one VM and access other VMs on the same host
44
Scenario: A user downloads a pre-built VM from an unfamiliar website to save setup time. What security risk does this create?
The VM may contain embedded malware. Running a downloaded VM means running a potentially infected OS. Always build your own VMs or thoroughly verify the source
45
Scenario: A call center wants to give hundreds of employees full desktop access without buying powerful workstations. What technology?
VDI (Virtual Desktop Infrastructure) or DaaS. Desktops run as VMs on a central server or in the cloud and employees only need basic terminals
46
Scenario: A dev team needs to deploy dozens of microservices quickly, portable and lightweight without full guest OS overhead. What to use?
Application containerization using Docker. Each service runs in its own container sharing the host OS making them lightweight, fast to deploy and highly portable
47
Scenario: A VM needs full access to the local network so other devices see it as just another device on the same subnet. What network config?
Bridge network. The VM acts as a full member of the local network with its own IP address on the same subnet as physical devices with no NAT
48
Scenario: A highly sensitive VM must not communicate with any external network or other VMs. What network configuration?
Private network. Isolates the VM so it can only communicate with itself and any devices specifically configured to interact with it
49
Scenario: Intel-based servers run VMs slowly and CPU virtualization support may be disabled. What setting to check and what is it called?
Check BIOS/UEFI settings for Intel VT (Virtualization Technology). This must be enabled for the CPU to take full advantage of hardware-assisted virtualization