Lesson 6 Flashcards

1
Q

What are the five types of user accounts in OS X? How are they different?

A

Standard is the default account type; administrative users can make changes to the system; a guest user doesn’t require a password; sharing-only users can access only shared files; and the root user has unlimited access to any file or folder in the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some security risks associated with each type of user account?

A

Standard user accounts are very secure, assuming they have good passwords. Administrative users can make changes that may negatively affect the system or other user accounts. A guest user could potentially fill shared folders with unwanted files. Sharing-only users are generally very secure as long as you don’t give them too much access to your items. The potential for mayhem with root user access is nearly unlimited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are account attributes?

A

Account attributes are the individual pieces of information used to define a user account. Examples include full name, account name, user ID, Universally Unique ID (UUID), group, and home folder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can you limit a user account from having full access to all applications?

A

Parental Controls can further limit a user account. Examples include enforcing a simple Finder, limiting applications and widgets, limiting Mac App Store content, setting time limits, and content filtering for several applications included in OS X.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What types of resource contention issues can occur when fast user switching is enabled?

A

Resource contention occurs when fast user switching is enabled and a user tries to access an item another user already has open in the background. Document contention occurs when a user attempts to open a document another user has already opened. Peripheral contention occurs when a user attempts to access a peripheral already in
use by another user’s open application. Application contention occurs when the second user attempts to access an application designed to run only once on a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What security risk related to storage can occur when fast user switching is enabled?

A

When fast user switching is enabled, all users are allowed to see other users’ locally connected disks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly