9. Manage Security and Privacy Flashcards

1
Q
  1. What are the different types of passwords you use to secure a Mac?
A
  1. These are the different types of passwords you use to secure a Mac:
    a. Local user account password.
    b. Apple ID and password—For iCloud, iTunes, and the App Store.
    c. Keychain passwords—To protect authentication assets in encrypted keychain files.
    d. Resource passwords—Such as email, websites, file servers, apps, and encrypted disk images.
    e. Firmware password—Prevents your Mac from starting up up from any disk other than your designated startup disk.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which types of items can you store in a keychain?
A
  1. You use Keychains to store resource passwords, certificates, keys, website forms and secure notes. The keychain system can also securely store Safari AutoFill information, Internet Account settings, and secure text notes.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. How does Keychain Access help protect your information?
A
  1. Keychain Access manages encrypted files that are used to securely save your items. They are impenetrable unless you know the keychain password. If you forget the keychain password, you lose the file contents forever.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Where are keychain files stored?
A
  1. Keychains are stored throughout macOS for different users and resources.
    a. Local login keychains are stored in /Users/username/Library/Keychain/login.keychain.
    b. Other local keychains are stored in /Users/username/Library/Keychains/others.keychain.
    c. iCloud keychains are stored in /Users/username/Library/Keychains/UUID/ .
    d. System keychains are stored in /Library/Keychains/System.keychain.
    e. System Root keychains for trusted networks do not appear by default, but can be located here: /System/Library/Keychains/
    f. Other keychains can be found throughout macOS. You should leave these files alone unless you’re instructed by a trusted source to resolve an issue.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. What app should you use to manage keychain settings?
A
  1. You should use Keychain Access to view and modify most keychain items.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. How does two-factor authentication provide added security to your Apple ID?
A
  1. With two-factor authentication, your Apple ID account can be accessed only on devices you trust, like your iPhone, iPad, or Mac.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. When and why would you use an iCloud Security Code?
A
  1. If you use an Apple ID that doesn’t have two-factor authentication enabled, iCloud Keychain is automatically enabled. You should use the iCloud Security Code to grant access to use your Apple ID on additional devices.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. How can you limit the use of Location Services?
A
  1. You can use the Privacy pane of Security & Privacy preferences to configure app access to Location Services, Contacts, Calendars, Reminders, and social network services. When a new app requests information that is considered personal, macOS asks you for permission.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. How can you ensure that audio recordings used for Dictation service remain private?
A
  1. Enhanced Dictation option is enabled by default. When you use Enhanced Dictation, your Mac converts what you say into text without sending your dictated speech to Apple. Only if you turn Enhanced Dictation off is what you say is sent to Apple to be converted to text.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Which feature can you enable to find a lost Mac?
A
  1. iCloud Find My Mac helps you find a lost Mac by allowing you to remotely access the Mac computer’s Location Services service.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly