⚡ What is Virtualization?
Virtualization is the process of running multiple virtual computers on a single physical machine. A piece of software called a hypervisor divides the physical hardware — CPU, RAM, storage, network — into isolated virtual machines (VMs), each behaving as if it were a dedicated physical computer. One server running 10 VMs replaces 10 physical servers, dramatically reducing hardware costs, power consumption, and data centre space.

Type 1 vs Type 2 Hypervisors

The most tested virtualization concept on the A+ Core 2 exam is the distinction between Type 1 and Type 2 hypervisors. They differ in where they run relative to the host operating system:

Bare-Metal Hypervisor
Type 1 Hypervisor
Runs directly on the physical hardware — there is no host OS underneath it. The hypervisor IS the operating system. VMs run on top of the hypervisor, which directly manages the hardware resources.

Performance: Best — no host OS overhead.
Use case: Enterprise data centres, production servers, cloud infrastructure.
Security: Smaller attack surface — no underlying OS to compromise.
Examples: VMware ESXi · Microsoft Hyper-V (server) · Citrix XenServer · KVM (Linux kernel)
Hosted Hypervisor
Type 2 Hypervisor
Runs on top of a host operating system as an application — the host OS runs first, then the hypervisor runs within it as software. VMs run inside the hypervisor application.

Performance: Lower — two OS layers add overhead.
Use case: Developer workstations, home labs, testing environments.
Security: Larger attack surface — host OS vulnerabilities affect all VMs.
Examples: VMware Workstation · Oracle VirtualBox · Parallels Desktop · QEMU
⚡ Type 1 vs Type 2 — The one-line test

Type 1 = no host OS underneath (bare metal). Type 2 = runs on top of a host OS (hosted). The exam gives you a scenario — "A company wants maximum performance for production VMs running 24/7 in a data centre." → Type 1. "A developer wants to test software in different OS environments on their laptop." → Type 2.

Remember: VMware ESXi = Type 1. VMware Workstation = Type 2. Both are VMware products but fundamentally different architectures.

Key Virtualization Concepts

ConceptWhat It IsExam Relevance
Guest OSThe operating system running inside a VM — it believes it's running on real hardware but is actually running in a virtualised environmentEach VM runs its own guest OS — a single physical host can run Windows Server, Ubuntu, and Windows 10 simultaneously
Host OSThe operating system the Type 2 hypervisor runs on — the base OS of the physical machine (e.g. Windows 10 running VirtualBox)Type 1 has no host OS. Type 2 requires one.
SnapshotA point-in-time copy of a VM's state — disk contents, memory, and configuration captured at that moment. Can be restored to roll the VM back to that exact state.A+ Core 2 — used for safe testing (take snapshot, test, revert if needed) and backup. Not a substitute for full backups.
VM TemplateA pre-configured VM image used as a master copy to rapidly deploy identical VMs — avoids reinstalling OS and software for every new VMEnterprise provisioning — deploy 50 identical VMs in minutes from one template
vCPUVirtual CPU — a portion of a physical CPU's capacity allocated to a VM. Multiple VMs can share physical CPU cores.Over-provisioning vCPUs causes performance issues — common troubleshooting scenario
VM SprawlThe uncontrolled proliferation of VMs — too many VMs created and never decommissioned, consuming resources and creating security risksSecurity+ — abandoned VMs may not receive patches, creating vulnerabilities. Requires VM lifecycle management.
Live MigrationMoving a running VM from one physical host to another with no downtime — the VM keeps running during the move (VMware vMotion, Hyper-V Live Migration)Network+ / Security+ — enables maintenance without downtime; requires shared storage
Nested VirtualisationRunning a hypervisor inside a VM — a VM running its own VMs. Supported by some hypervisors; used in labs and cloud training environments.Lab environments — your home lab may use nested virtualisation

VMs vs Containers

Containers are a lighter-weight alternative to full VMs. Both isolate workloads, but they do it differently:

FeatureVirtual MachineContainer
What's isolatedFull OS + application — each VM has its own kernel, OS libraries, and processesApplication + dependencies only — shares the host OS kernel
SizeGigabytes — full OS image per VMMegabytes — just the application and its libraries
Startup timeMinutes — full OS boot sequenceSeconds or milliseconds — no OS boot needed
IsolationStrong — each VM has its own kernel, hardware-enforced separationWeaker — all containers share the host kernel; a kernel vulnerability affects all
PortabilityHeavy — VM images are large and tied to hypervisor formatHigh — containers run identically on any system with the container runtime
TechnologyVMware, Hyper-V, VirtualBoxDocker, Podman, Kubernetes (orchestration)
Use caseRunning different OS types, strong isolation requirements, legacy appsMicroservices, DevOps pipelines, cloud-native applications

Cloud Service Models — IaaS, PaaS, SaaS

Cloud computing is virtualisation at scale — providers like AWS, Azure, and Google Cloud run massive hypervisor farms and rent virtual resources. The A+ Core 2 and Network+ exams test the three cloud service models:

ModelWhat the Provider ManagesWhat You ManageExamples
IaaS
Infrastructure as a Service
Physical hardware, networking, virtualisation layer, storageOS, middleware, applications, data — you install and manage everything above the hypervisorAWS EC2, Azure VMs, Google Compute Engine
PaaS
Platform as a Service
Everything in IaaS plus the OS, runtime, middleware, and development toolsYour application code and data only — the platform handles everything beneathAWS Elastic Beanstalk, Azure App Service, Google App Engine, Heroku
SaaS
Software as a Service
Everything — hardware through applicationYour data and user configuration only — you just use the softwareMicrosoft 365, Google Workspace, Salesforce, Dropbox
Cloud Deployment Models

Public cloud: Resources shared among multiple customers on provider infrastructure (AWS, Azure, GCP). Most cost-effective, least control.

Private cloud: Cloud infrastructure dedicated to a single organisation — either on-premises or hosted. Full control, higher cost.

Hybrid cloud: Combination of public and private — workloads move between them based on need. Common enterprise model.

Community cloud: Shared infrastructure for organisations with similar requirements (government agencies, healthcare providers). Less common on the exam but present.

Virtualisation Security Concerns

ConcernDescriptionDefence
VM EscapeAn attacker exploits a hypervisor vulnerability to break out of a VM and access the host system or other VMs — the most severe virtualisation attackKeep hypervisors patched, use Type 1 for isolation, monitor for anomalous inter-VM communication
VM SprawlUncontrolled creation of VMs leads to unpatched, forgotten systems that become attack vectorsVM lifecycle management policies, automated patch compliance, regular audits of running VMs
Snapshot RisksOld snapshots may contain unpatched OS states — restoring a snapshot rolls back security patchesLimit snapshot retention, delete snapshots after testing, never restore old snapshots to production
Shared ResourcesVMs on the same host share physical CPU and memory — side-channel attacks (like Spectre/Meltdown) can potentially leak data between VMsCPU microcode patches, hypervisor isolation features, separate sensitive workloads to dedicated hosts

Exam Scenarios

💬 "A company wants to run multiple server workloads on dedicated hardware with maximum performance and no host OS. Which hypervisor type should they use?" → Type 1 (bare-metal) hypervisor — runs directly on hardware. Examples: VMware ESXi, Microsoft Hyper-V Server.
💬 "A developer wants to test an application on Windows, Ubuntu, and macOS on their Windows laptop. Which virtualisation solution is most appropriate?" → Type 2 hypervisor (hosted) — VMware Workstation or VirtualBox runs as an application on the host Windows OS.
💬 "A technician needs to test a potentially malicious script safely. What virtualisation feature allows them to restore the VM to a clean state after testing?" → Snapshot — take a snapshot before testing, run the script, then revert the snapshot to restore the clean state.
💬 "Which cloud model requires the customer to manage the operating system and applications but not the physical hardware?" → IaaS (Infrastructure as a Service) — the provider manages hardware and virtualisation; the customer manages OS upward.
💬 "A company uses Microsoft 365 for email and collaboration. Which cloud model is this?" → SaaS (Software as a Service) — the provider manages everything; users just use the application.
💬 "An attacker exploits a hypervisor vulnerability to access the host system from inside a VM. What is this attack called?" → VM escape — breaking the virtualisation boundary to access the hypervisor or other VMs on the same host.
💬 "What is the main security risk of VM sprawl?" → Forgotten, unpatched VMs become attack vectors. VMs that are no longer monitored may have unpatched vulnerabilities and outdated security configurations.
💬 "How do containers differ from VMs in terms of OS isolation?" → Containers share the host OS kernel — they only isolate the application and its dependencies. VMs each run a full guest OS with their own kernel, providing stronger isolation.

Studying for A+ Core 2?

See the best study guides and practice exams for the 220-1202 exam.

See A+ Study Resources →

Related Articles