eval questions Flashcards

1
Q

What is a VM?

A

A VM is a software program that provides an isolated environment with its own OS and apps, running on host hardware. It has virtual resources allocated by a hypervisor.

  1. vm hya wahed l virtual version dyal computer tatkon isolated 3la l host, so basically taykkon 3ndna wahe l l physical computer/server and with the help of a hypervisor n9dro n create bzef dyal l virtual machines li taykon isolated 3la b3dyathom and 3la l host.

vm hya wahed l machine running on top of another machine (l host dyalna)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a hypervisor ?

A

A hypervisor is a program that creates and runs VMs. It’s responsible for allowing multiple VMs to run on the physical hardware simultaneously and allocating resources for them.
there are 2 types of hypervisors in type 1 which runs directly on hardware, and type02 or hosted hypervisor which is a software that runs on top of an OS like virtualbox.

hypervisor howa wahed software li tay create and mange bih VMs dyalna + howa li responsible bach y allocate ressources ll VMs

hypervisor howa wahed software li tay create and mange bih VMs dyalna +

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What it the purpose of a VM?

A

VMs are used for testing, running legacy software, and running software for different OS. They offer benefits like portability, security, but require expertise and have a performance cost.

well VMs tankhdmo bihom bach ntestiw legacy software, or just because bghina mhtajin bzaf dayl types dyal machines or for sandboxing

well VMs tankhdmo bihom bach ntestiw legacy software, or just because bghina mhtajin bzaf dayl types dyal machines or for sandboxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do VMs works? (shit)

A

VM working through “Virtualization” technology. Virtualization uses software to simulate virtual hardware that allows VMs to run on a single host machine.

A virtual machine uses software emulation of hardware to create an isolated environment on top of hardware where a separate system with its own OS can be run. Therefore allowing for things like running Debian inside a Mac.

A virtual machine uses software emulation of hardware to create an isola

VMs taykhdmo bl VERTUALIZATION li hya l hypervisor dyalna tay create isolated environment on top of l hardware w ta allocati physical ressources ll VM and taykhliha t feel as if those are real hardware ressources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why did u choose Debian?

A

Cuz it’s easier to install and configure and recommended by the subject and it’s beginner friendly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Debian VS Rocky?

A

Rocky Linux, being a newer operating system targeted towards enterprise users, emphasizes stability and compatibility with Red Hat Enterprise Linux (RHEL). In contrast, Debian, with its established history, caters to a wider user base including end users and enterprises. Debian boasts a larger community and a diverse range of packages, making it a versatile choice for various computing needs. On the other hand, Rocky Linux is specifically designed to deliver a secure and reliable enterprise-grade operating system tailored for business environments.

well there are 3 major

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Wtf is Apparmor ?

A

So apparmor is a security module, it’s purpose is to restrict the permissions and file access of certain apps, and it does it using per-program profiles and modes.
each application in apparmor has it’s own profile with the permissions and file access permissions, and also a mode to enforce the policies. There are 2 mods, enforced mode which blocks and logs every violation, and the complain mode which allow access to the resources but logs the violation.

so apparmor howa wa7ed l security module l purpose dyalo hya y restricti l permissions wl file access for each app, kifach taykhdem ? kola app for example ssh, cd …. tay3tiha profile fih l permissions dyal l app wl files li t9der w mat9derch t accedi, w bach t enfori had l policies kaynin 2 modes (enforcement mode ==> block + log) and (complain mode ==> log).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

apt vs aptitude?

A

aptitude have a GUI while apt doesn’t.
aptitude automatically removes unused packages while apt-get doesn’t.
aptitude have a better search engine.
aptitude suggests measures to handle certain problems while apt-get doesn’t.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is LVM ?

A

a tool that we use to abstract the physical drive to a logical one which give us more flexibility and control while using it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is UFW?

A

UFW is a program used to manage firewalls from the CLI. we use it to do stuff like blocking ports, assigning ports to certain services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is UFW used for ?

A
  • Logging : u can log firewall events …
  • blocking specific IPs or whole subnets.
  • basic firewall configuration like accepting or denying traffic from certain ports, assigning ports to certain services …
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is portforwarding?

A

port-forwarding is the act of redirecting network traffic from one port on a network device to another port on another device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

requiretty?

A

it baiscally means that sudo commands need to be executed from a terminal with an active tty session, that way it prevents running sudo from scripts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

how ssh works ?

A
  1. the client and the server establish a tcp connection and exchange public keys and banners.
  2. the clinet generate a session key and encrypts it with the server’s public key and sends it to the server which decrypts it using it’s private key.
  3. then we authenticate using pass/username or keys … the credentials are encrypted using the session key and sent to the server which verifies them.
  4. the connection is established and the traffic is encrypted using the session key.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly