Back to AI Flashcard MakerInformation Technology /CompTIA Security+ (SY0-601): Virtualization

CompTIA Security+ (SY0-601): Virtualization

Information Technology11 CardsCreated 3 months ago

This section outlines types of virtual machines—system VMs that emulate full physical systems and processor VMs that run specific applications. It also explains hypervisors, distinguishing between Type I (bare metal) and Type II (hosted), which manage virtual environments either directly on hardware or through a host operating system.

VM Types: System Virtual Machine

Complete platform designed to replace an entire physical computer and includes a full desktop/server operating system

Tap or swipe ↕ to flip
Swipe ←→Navigate
1/11

Key Terms

Term
Definition

VM Types: System Virtual Machine

Complete platform designed to replace an entire physical computer and includes a full desktop/server operating system

VM Types: Processor Virtual Machine

Designed to only run a single process or application like a virtualized web browser or a simple web server

Hypervisor: Type I vs. Type II

Type I:
AKA: Bare Metal Hypervisor
There is no OS under the hypervisor

Type II:

VM: Container-Based

Application Containerization:
A single operating system kernel is shared across multiple virtual machines but each vi...

VM Escape

An attack that allows an attacker to break out of a normally isolated VM by interacting directly with the hypervisor

...

Data Remnants

Contents of a virtual machine that exist as deleted files on a cloud-based server after deprovisioning of a virtual mach...

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition

VM Types: System Virtual Machine

Complete platform designed to replace an entire physical computer and includes a full desktop/server operating system

VM Types: Processor Virtual Machine

Designed to only run a single process or application like a virtualized web browser or a simple web server

Hypervisor: Type I vs. Type II

Type I:
AKA: Bare Metal Hypervisor
There is no OS under the hypervisor

Type II:
The hypervisor is above the host OS

VM: Container-Based

Application Containerization:
A single operating system kernel is shared across multiple virtual machines but each virtual machine receives its own user space for programs and data

Containerization allows for rapid and efficient deployment of distributed applications

Ex: Docker, Parallels Virtuozzo, OpenVZ

VM Escape

An attack that allows an attacker to break out of a normally isolated VM by interacting directly with the hypervisor

Elasticity allows for scaling up or down to meet user demands

Data Remnants

Contents of a virtual machine that exist as deleted files on a cloud-based server after deprovisioning of a virtual machine

Can be caused by elasticity

Live Migration

When a VM is moved from one physical server to another over the network

Securing VMs

Uses many of the same security measures as a physical server

Limit connectivity between the virtual machine and the host

Remove any unnecessary pieces of virtual hardware from the virtual machine

Using proper patch management is important to keeping your guest’s operating system secure

Virtualization Sprawl

Occurs when virtual machines are created, used, and deployed without proper management or oversight by the system admins

Fog & Fog Computing

Fog:
A cloud that’s close to your data
Cloud + IoT

Fog computing:
Distributed cloud architecture - extends the cloud
Private data never leaves (maximizes security)
Long-term analysis can occur in the cloud (internet only when required)

Edge Computing

Technology & data for IoT devices occur on the device themselves
No latency, no network requirement
Increased speed/performance
Data is processed where it is, not in the cloud