Quiz 3

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 69

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

70 Terms

1

Operating Systems

Software that manages computer hardware and provides services for computer programs.

New cards
2

Hardware

Physical components of a computer system that can be seen and touched.

New cards
3

Virtualization Architectures

Creating a virtual layer using software to mimic hardware for running applications.

New cards
4

Cloud Computing Architecture

Utilizes operating systems, hardware, and virtualization to enable services over the internet.

New cards
5

Virtual Machine

Software-based emulation of a physical computer that runs applications independently.

New cards
6

Operating System Architecture

The structure of an operating system that sits between computer and network hardware and users, providing an interface for application software to utilize hardware capabilities.

New cards
7

Architecture Dependent Code

Code within an operating system that connects software to underlying hardware, allowing direct interaction with the hardware and requiring adjustments when transitioning between different hardware architectures.

New cards
8

Dynamic Link Libraries

Modules within an operating system necessary to leverage hardware capabilities and support applications, providing reusable components for multiple applications.

New cards
9

Kernel Interface

The component of an operating system that connects user space (applications, window manager, libraries) to the kernel, enabling access to hardware capabilities.

New cards
10

Privilege Levels

Different levels of privilege within an operating system, with the kernel having the highest privilege, followed by drivers, the operating system shell, and users, to ensure system security and prevent harmful actions.

New cards
11

Process

The basic unit of work in an operating system, representing a running program with all necessary resources, which can spawn threads to execute tasks in parallel.

New cards
12

Thread

A subunit of a process that can be executed independently in parallel, with a multi-threaded process capable of spawning multiple simultaneous threads to improve performance.

New cards
13

Intel 64 bit architecture

The dominant architecture in personal computers and low-end servers, widely used in cloud computing for large-scale infrastructures.

New cards
14

CPU

Central Processing Unit, the core component of a computer system that executes instructions.

New cards
15

Input Output Controller

Connects the CPU to peripherals like hard drive controllers and graphic interface cards.

New cards
16

System Memory

Memory connected to the CPU for storing data and instructions.

New cards
17

Cache

Storage within the CPU for data and instructions to be used next, with different levels for efficiency.

New cards
18

Multi-core CPU

CPUs with multiple cores that allow for parallel processing of tasks.

New cards
19

Execution Units

Components within the CPU that run threads created by processes.

New cards
20

Threads

Individual sequences of instructions that can be executed independently, allowing for parallel processing.

New cards
21

Process

A unit of work in the operating system, created when launching an application and executed on the CPU architecture.

New cards
22

Operating System

Software that manages computer hardware and software resources, including running processes on the CPU.

New cards
23

Virtualization

Simulating hardware using software to create virtualized versions of CPU, memory, storage, and networking.

New cards
24

Virtual Machine

A virtual computer running on top of virtualized hardware, allowing the installation of an operating system and running applications.

New cards
25

Virtualization Software

Specialized software that creates virtualized hardware on top of physical hardware, enabling the creation of virtual machines.

New cards
26

Cloud Computing

Utilizing virtualization as a fundamental capability to build cloud services, where virtual machines run applications on virtualized hardware.

New cards
27

Hardware Layer

The physical components of a computer system, including CPU, memory, storage, and networking capabilities.

New cards
28

Operating System Layer

Software that manages hardware resources and provides services for applications to run on top of the hardware layer.

New cards
29

Application Software

Programs designed to perform specific tasks or functions on a computer system, running on top of the operating system layer.

New cards
30

Shared Storage

Storage resources accessible by multiple virtual machines, typically connected to a storage array or storage area network.

New cards
31

Maximum Capability

The limit of virtualized hardware capabilities imposed by the underlying physical hardware, minus the overhead required by the virtualization software.

New cards
32

Architecture

The structure of virtual machines, consisting of hardware, operating system, and applications, with the same layout across different virtual machines.

New cards
33

Virtualization Efficiency

Virtualization allows for more efficient use of hardware by creating virtual machines that match specific needs, avoiding overprovisioning.

New cards
34

Dynamic Resource Allocation

Virtualization enables the dynamic allocation of resources to virtual machines based on workload demands, optimizing performance.

New cards
35

Encapsulation

Virtual machines can be encapsulated into single files, including hardware, OS, and applications, making them portable and easy to duplicate or move between physical servers.

New cards
36

High Portability

The encapsulation of virtual machines makes them highly portable, allowing for quick migration between physical servers and balancing workloads efficiently.

New cards
37

Business Benefits

Virtualization provides operational efficiency, the ability to run multiple OSs, and the flexibility to clone or move virtual machines, enhancing data center management and resilience.

New cards
38

Full Virtualization

A type of virtualization where each instance of an operating system and its applications runs on a separate virtual machine on top of virtualized hardware.

New cards
39

Hypervisor

The Virtual Machine Manager that serves as the interface between virtualized hardware and the underlying physical hardware, managing guest operating systems on a host.

New cards
40

Bare Metal Virtualization

A type of virtualization where a hypervisor runs directly on the hardware without the need for an underlying operating system, commonly used in cloud computing.

New cards
41

Hypervisor Baseline Functions

Core capabilities defined by the National Institute of Standards and Technology for hypervisors, including execution isolation for virtual machines and device emulation.

New cards
42

Privileged Operations

Operations within an operating system that require a high level of privilege, such as kernel mode, which must be managed securely by the hypervisor.

New cards
43

Resource Allocation

The ability of the hypervisor to allocate resources among virtual machines, adjusting resource distribution based on the needs of each virtual machine.

New cards
44

Virtual Network Interfaces

Interfaces created by the hypervisor to connect virtual machines to an underlying network, allowing virtual machines to communicate with each other if needed.

New cards
45

Hypervisor

Software that enables the creation and management of virtual machines on physical hardware.

New cards
46

Virtual Machine

A software-based emulation of a physical computer that operates and executes programs like a physical machine.

New cards
47

Virtual Infrastructure

The virtualized layer created by connecting hypervisors across multiple physical machines to optimize hardware utilization.

New cards
48

Mesh Network

A high-speed network where multiple devices or nodes are interconnected, allowing for efficient communication and data transfer.

New cards
49

Abstraction

The process of hiding complex underlying details and presenting only the necessary information to users or applications.

New cards
50

Data Center

A facility that houses computer systems and associated components, such as storage and networking systems, for managing and storing data.

New cards
51

Cloud Computing

The delivery of computing services, including servers, storage, databases, networking, software, and analytics, over the internet to offer faster innovation, flexible resources, and economies of scale.

New cards
52

Virtualization Security Challenges

When virtualizing systems, it introduces security challenges due to shared virtualization layers, potentially allowing processes to escape virtual machines and compromise the underlying hypervisor.

New cards
53

Isolation of Virtual Machines

Virtual machines are logically isolated from each other, but sharing a common virtualization layer can lead to security risks if a process breaches the isolation and gains access to other virtual machines.

New cards
54

Sandboxing

Sandboxing involves isolating guest operating systems to prevent unauthorized access to resources, injecting malware, or causing denial of service attacks between virtual machines.

New cards
55

Monitoring Guest Operating Systems

Hypervisors must constantly monitor guest operating systems to detect and control malicious activities, ensuring security within the virtualized environment.

New cards
56

Network Security

Implementing security policies, firewalling, identity and access management, and access restrictions within virtual machines to secure network traffic going in and out of the guest operating system.

New cards
57

Hardware Assisted Virtualization

Running a hypervisor on an underlying CPU architecture that supports virtualization in hardware, providing better memory management controls to prevent attacks like buffer overflow attacks.

New cards
58

Device Driver Signing

Enforcing quality checks or signing for device drivers added to virtual machines or the hypervisor to prevent unstable drivers from potentially crashing the system.

New cards
59

Privileged Accounts Management

Limiting the number of users with admin or root level privileges on the hypervisor, integrating high privileged accounts with identity and access management systems, and enforcing privilege escalation controls.

New cards
60

Remote Access Security

Limiting remote access to the hypervisor to prevent potential attack vectors, tightly controlling backup accounts with remote access capabilities, and ensuring remote access is not part of day-to-day operations.

New cards
61

Patch Management

Implementing a good patch management system to keep the hypervisor up to date with the latest security updates.

New cards
62

Default Deny Principle

Applying the principle of default deny within the hypervisor's firewall by explicitly defining allowed ports and protocols while denying everything else to enhance security.

New cards
63

Logging and Monitoring

Logging all activities within the hypervisor for forensic analysis, establishing a secure channel to transfer log information to an external storage system, and monitoring for anomaly detection in real-time.

New cards
64

Management Network Segmentation

Utilizing a separate management network for managing devices, ensuring the hypervisor management interface is on the management network to enforce traffic controls and limit access to authorized systems.

New cards
65

Virtualization

The process of creating a virtual version of something, such as virtual machines, by abstracting hardware capabilities.

New cards
66

Enabler of Cloud Computing

Virtualization is considered an enabler of cloud computing as it allows for the creation of large pools of hardware resources.

New cards
67

Pooled Infrastructure

The goal of virtualization in cloud computing is to create a pooled infrastructure, including CPU, memory, storage, and network capabilities.

New cards
68

Building Block for Cloud Environment

Virtualization serves as a fundamental building block for most cloud environments by abstracting hardware resources.

New cards
69

Rapid Scaling

Virtualization provides the ability to rapidly scale resources, a crucial capability needed in cloud computing environments.

New cards
70

Allocation by Cloud Layer

While virtualization creates the pool of resources, it is the cloud layer that determines how these resources are allocated, delivered, and presented to consumers.

New cards

Explore top notes

note Note
studied byStudied by 1 person
65 days ago
5.0(1)
note Note
studied byStudied by 16 people
863 days ago
5.0(1)
note Note
studied byStudied by 33 people
1045 days ago
5.0(1)
note Note
studied byStudied by 2 people
312 days ago
5.0(1)
note Note
studied byStudied by 12 people
883 days ago
5.0(1)
note Note
studied byStudied by 55 people
878 days ago
5.0(1)
note Note
studied byStudied by 8 people
824 days ago
5.0(1)

Explore top flashcards

flashcards Flashcard (51)
studied byStudied by 11 people
3 days ago
5.0(1)
flashcards Flashcard (133)
studied byStudied by 13 people
725 days ago
5.0(2)
flashcards Flashcard (34)
studied byStudied by 52 people
446 days ago
5.0(2)
flashcards Flashcard (24)
studied byStudied by 14 people
351 days ago
5.0(1)
flashcards Flashcard (66)
studied byStudied by 1 person
693 days ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 5 people
491 days ago
5.0(1)
flashcards Flashcard (345)
studied byStudied by 73 people
799 days ago
5.0(4)
flashcards Flashcard (87)
studied byStudied by 68 people
799 days ago
5.0(3)
robot