CompTIA Security+ (SY0-601): Virtualization
This section outlines types of virtual machines—system VMs that emulate full physical systems and processor VMs that run specific applications. It also explains hypervisors, distinguishing between Type I (bare metal) and Type II (hosted), which manage virtual environments either directly on hardware or through a host operating system.
VM Types: System Virtual Machine
Complete platform designed to replace an entire physical computer and includes a full desktop/server operating system
Key Terms
VM Types: System Virtual Machine
Complete platform designed to replace an entire physical computer and includes a full desktop/server operating system
VM Types: Processor Virtual Machine
Designed to only run a single process or application like a virtualized web browser or a simple web server
Hypervisor: Type I vs. Type II
Type I:
AKA: Bare Metal Hypervisor
There is no OS under the hypervisor
Type II:
VM: Container-Based
Application Containerization:
A single operating system kernel is shared across multiple virtual machines but each vi...
VM Escape
An attack that allows an attacker to break out of a normally isolated VM by interacting directly with the hypervisor
...Data Remnants
Contents of a virtual machine that exist as deleted files on a cloud-based server after deprovisioning of a virtual mach...
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
VM Types: System Virtual Machine | Complete platform designed to replace an entire physical computer and includes a full desktop/server operating system |
VM Types: Processor Virtual Machine | Designed to only run a single process or application like a virtualized web browser or a simple web server |
Hypervisor: Type I vs. Type II | Type I: Type II: |
VM: Container-Based | Application Containerization: Containerization allows for rapid and efficient deployment of distributed applications Ex: Docker, Parallels Virtuozzo, OpenVZ |
VM Escape | An attack that allows an attacker to break out of a normally isolated VM by interacting directly with the hypervisor Elasticity allows for scaling up or down to meet user demands |
Data Remnants | Contents of a virtual machine that exist as deleted files on a cloud-based server after deprovisioning of a virtual machine Can be caused by elasticity |
Live Migration | When a VM is moved from one physical server to another over the network |
Securing VMs | Uses many of the same security measures as a physical server Limit connectivity between the virtual machine and the host Remove any unnecessary pieces of virtual hardware from the virtual machine Using proper patch management is important to keeping your guest’s operating system secure |
Virtualization Sprawl | Occurs when virtual machines are created, used, and deployed without proper management or oversight by the system admins |
Fog & Fog Computing | Fog: Fog computing: |
Edge Computing | Technology & data for IoT devices occur on the device themselves |