Security and Protection & Virtual Machines

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/7

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

8 Terms

1
New cards

Malware

Software design to exploit computer.

2
New cards

Trojan Horse

Program that acts like normal program but has malicious software.

3
New cards

Spyware

Program that captures user data.

4
New cards

Ransomware

Locks up data via encryption.

5
New cards

Type 0 hypervisors

Hardware-based solutions that provide support for virtual machine creation and management via firmware.
EX: VMware ESXi, Microsoft Hyper-V Server, XenServer

6
New cards

Type 1 hypervisors

Operating system like software built to provide virtualization.
EX: VMware ESX, Joyent SmartOS, Citrix XenServer

7
New cards

Type 2 hypervisors

Applications that run on standard operating system but provide VMM features to guest os.
EX: VMware workstation and fusion, Parallels Desktop, Oracle VirtualBox

8
New cards

Sniffing
Spoofing
Man-in-the-middle

Threats