2. User Accounts: Lesson Five Flashcards

1
Q

What are the five types of user accounts in OS X?

How are they different?

A
  • Standard is the default account type
  • Administrative users can make changes to the system
  • Guest user doesn’t require a password
  • Sharing-only users can access only shared files
  • Root user has unlimited access to any file or folder in the system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some security risks associated with each type of user account?

A
  • Standard user accounts are very secure, assuming they have strong passwords.
  • Administrative users can make changes that may negatively affect the system or other user accounts.
  • A guest user could fill shared folders with unwanted files.
  • Sharing-only users are generally very secure as long as they don’t have too much access to other user’s items.
  • The potential for mayhem with root user access is nearly unlimited.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which two password methods are supported by OS X El Capitan for local user accounts?

A

In OS X, local user accounts can take advantage of a locally saved password or a password that’s linked to an Apple ID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are account attributes?

A

Account attributes are the individual pieces of information used to define a user account.
Examples include full name, account name, user ID, Universally Unique ID (UUID), group, and home folder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can you limit a user account from having full access to all apps?

A

Parental controls can further limit a user account.
Examples include enforcing a simple Finder, limiting apps and widgets, limiting App Store content, setting time limits, and filtering content for several apps included in OS X.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What types of resource contention issues can occur when fast user switching is enabled?

A
  • Resource contention occurs when fast user switching is enabled and a user tries to access an item that another user has open in the background.
  • Document contention occurs when a user attempts to open a document that another user has already opened.
  • Peripheral contention occurs when a user attempts to access a peripheral that’s already in use by another user’s open app.
  • Application contention occurs when a second user attempts to access an app that is designed to run only once on a system.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which storage-related security risk can occur when fast user switching is enabled?

A

When fast user switching is enabled, all users are allowed to see other users’ locally connected disks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly