Client Side Virtualization 4.2

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/31

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:03 AM on 7/21/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

32 Terms

1
New cards

Virtualization History

Established in the '60s, but VMware’s 1999 x86 breakthrough made it mainstream. It slashes costs, simplifies management, and packs serious perks.

2
New cards

Traditional Computing Model

A single OS controls all hardware. This model is inefficient as hardware often sits idle. Companies want better utilization, especially for expensive servers.

3
New cards

Virtualization

Improves efficiency by running multiple OSes (VMs) on one machine. Each VM is independent and runs its own applications, increasing hardware utilization.

4
New cards

Type 2 Hypervisor

Runs on top of a host OS to manage guest VMs. Examples include VMware Workstation, Oracle VM VirtualBox, Parallels Desktop, and QEMU.

5
New cards

Container Virtualization

Lightweight alternatives to VMs, sharing the host OS but isolating apps and dependencies for portability and security. They reduce overhead and licensing costs.

6
New cards

Containers vs. Virtual Machine

Containers = speed, size, and efficiency champs. VMs play well with any hypervisor; containers stick to their OS family, rock modular apps and lightning-fast scaling.

7
New cards

Virtualization Security

Physical hardware security is critical—VMs and containers live on it. One slip-up can spread like wildfire. Document virtual setups like real gear, and never mix internet-facing with internal services.

8
New cards

Sandbox virtualization

Isolated environment for safe software testing and development without risking production systems.

9
New cards

Application virtualization

Apps are run virtually to cut licensing costs, boost access, and simplify maintenance.

10
New cards

Legacy software access

Allows older applications to run on modern systems through virtual environments.

11
New cards

Cross-platform virtualization

Enables apps to run on different operating systems than originally designed for.

12
New cards

Hardware optimization

Improves hardware efficiency by utilizing idle CPU, RAM, and storage for multiple tasks.

13
New cards

Host machine

Physical server with shared hardware resources (HDD, RAM, CPU, NIC) for virtual environments.

14
New cards

Hypervisor

Software layer managing VMs and mediating between hardware and virtual OSes.

15
New cards

Virtual machine

Software-based computer that functions like a physical one, running its own OS and apps.

16
New cards

Virtual hard disk (VHD)

File-based simulated hard drive used by a VM.

17
New cards

vSwitch

Software that routes data packets between virtual machines.

18
New cards

vRouter

Virtualized router software that enables flexible IP routing independent of physical devices.

19
New cards

Virtual firewall application (VFA)

Software firewall that monitors and filters virtual network traffic within VMs.

20
New cards

What is VM escaping in virtualization security?

Type of security breach where a program or attacker breaks out of a virtual machine and gains access to the host system or other VMs

21
New cards

What is a rogue VM?

Avirtual machine that was created without authorization, often bypassing security controls

22
New cards

Why is rogue VM a security risk?

Consumes system/network resources, Bypasses monitoring, Runs malicious or unpatched software.

23
New cards

What is a third-party virtual machine?

A virtual machine image or appliance created by an external vendor or developer, not by your own IT team

24
New cards

What are third-party virtual machine risks?

Malware-infected or misconfigured images, Lack of patching or vendor support, Compatibility or licensing issues

25
New cards

Type 1 Hypervisor

Also called bare metal because it installs directly onto hardware without a host OS. Acts as the primary OS. Examples: VMware ESXi, Microsoft Hyper-V Server.

26
New cards
Type 1 vs Type 2 Equivalence
Functionally similar in managing VMs, but differ in how they access hardware. Type 2 depends on host OS, Type 1 runs natively.
27
New cards
VM Overhead
Each virtual machine needs its own full OS, which increases storage, memory, and processing overhead.
28
New cards
Containers Isolation
Each container is self-contained and unaware of other containers unless explicitly configured to communicate.
29
New cards
Container Portability
Containers don’t include a full OS, making them lightweight, fast to transfer, and highly portable between systems.
30
New cards
Single Host OS for Containers
All containers on a host share a single operating system kernel, which reduces overhead but limits OS flexibility.
31
New cards
Container Dependency on Host OS
Containerized applications must be compatible with the host OS; they rely on its kernel and services to function.
32
New cards
Docker & Container Compatibility
A Docker container must be compatible with the host OS and Docker version; you can’t always run the same container across different versions without issues.

Explore top flashcards

cogni finals
Updated 748d ago
flashcards Flashcards (178)
CMN E1-Obesity
Updated 239d ago
flashcards Flashcards (33)
ATRN - EXAM 2
Updated 712d ago
flashcards Flashcards (46)
HANDOUT 24.7.24
Updated 547d ago
flashcards Flashcards (93)
English vocab 2
Updated 172d ago
flashcards Flashcards (25)
cogni finals
Updated 748d ago
flashcards Flashcards (178)
CMN E1-Obesity
Updated 239d ago
flashcards Flashcards (33)
ATRN - EXAM 2
Updated 712d ago
flashcards Flashcards (46)
HANDOUT 24.7.24
Updated 547d ago
flashcards Flashcards (93)
English vocab 2
Updated 172d ago
flashcards Flashcards (25)