Client Side Virtualization 4.2

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/24

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

25 Terms

1
New cards

Virtualization History

Established in the '60s, but VMware’s 1999 x86 breakthrough made it mainstream. It slashes costs, simplifies management, and packs serious perks.

2
New cards

Traditional Computing Model

A single OS controls all hardware. This model is inefficient as hardware often sits idle. Companies want better utilization, especially for expensive servers.

3
New cards

Virtualization

Improves efficiency by running multiple OSes (VMs) on one machine. Each VM is independent and runs its own applications, increasing hardware utilization.

4
New cards

Type 1 Hypervisor

Runs directly on hardware and manages guest VMs. Examples: Microsoft Hyper-V Server, VMware ESX.

5
New cards

Type 2 Hypervisor

Runs on top of a host OS to manage guest VMs. Examples include VMware Workstation, Oracle VM VirtualBox, Parallels Desktop, and QEMU.

6
New cards

Container Virtualization

Lightweight alternatives to VMs, sharing the host OS but isolating apps and dependencies for portability and security. They reduce overhead and licensing costs.

7
New cards

Containers vs. Virtual Machine

Containers = speed, size, and efficiency champs. VMs play well with any hypervisor; containers stick to their OS family, rock modular apps and lightning-fast scaling.

8
New cards

Virtualization Security

Physical hardware security is critical—VMs and containers live on it. One slip-up can spread like wildfire. Document virtual setups like real gear, and never mix internet-facing with internal services.

9
New cards

Sandbox virtualization

Isolated environment for safe software testing and development without risking production systems.

10
New cards

Application virtualization

Apps are run virtually to cut licensing costs, boost access, and simplify maintenance.

11
New cards

Legacy software access

Allows older applications to run on modern systems through virtual environments.

12
New cards

Cross-platform virtualization

Enables apps to run on different operating systems than originally designed for.

13
New cards

Hardware optimization

Improves hardware efficiency by utilizing idle CPU, RAM, and storage for multiple tasks.

14
New cards

Host machine

Physical server with shared hardware resources (HDD, RAM, CPU, NIC) for virtual environments.

15
New cards

Hypervisor

Software layer managing VMs and mediating between hardware and virtual OSes.

16
New cards

Virtual machine

Software-based computer that functions like a physical one, running its own OS and apps.

17
New cards

Virtual hard disk (VHD)

File-based simulated hard drive used by a VM.

18
New cards

vSwitch

Software that routes data packets between virtual machines.

19
New cards

vRouter

Virtualized router software that enables flexible IP routing independent of physical devices.

20
New cards

Virtual firewall application (VFA)

Software firewall that monitors and filters virtual network traffic within VMs.

21
New cards

What is VM escaping in virtualization security?

Type of security breach where a program or attacker breaks out of a virtual machine and gains access to the host system or other VMs

22
New cards

What is a rogue VM?

Avirtual machine that was created without authorization, often bypassing security controls

23
New cards

Why is rogue VM a security risk?

Consumes system/network resources, Bypasses monitoring, Runs malicious or unpatched software.

24
New cards

What is a third-party virtual machine?

A virtual machine image or appliance created by an external vendor or developer, not by your own IT team

25
New cards

What are third-party virtual machine risks?

Malware-infected or misconfigured images, Lack of patching or vendor support, Compatibility or licensing issues