Lesson 9 Flashcards

Manage Security and Privacy

1
Q

What are the different types of passwords you use to secure a Mac?

A

a. Local user account—Used to log in to your Mac.
b. Apple ID—For iCloud, iTunes, and the App Store.
c. Keychain—To protect authentication assets in encrypted keychain files.
d. Resource—Such as email, websites, file servers, apps, and encrypted disk images.
e. Firmware—Prevents your Mac from starting up from any disk other than your designated startup disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What types of items can you store in a keychain?

A
Store resource passwords
Certificates
Keys
Website forms 
Safari AutoFill information
Secure text notes.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does Keychain Access help protect your information?

A

It manages encrypted files that are used to securely save your items.
Can’t be broken unless password is known.
If forgotten, file contents are gone forever.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where are keychain files stored?

A

Are stored in the Library folder under their respective names in the keychains folder.
a. Local login keychains are stored in Keychain/login.keychain.
b. Other local keychains are stored in Keychains/others.keychain.
c. iCloud keychains are stored in Keychains/UUID/.
d. System keychains are stored in /Library/Keychains/System.keychain.
e. System Root keychains for trusted networks do not appear by default, but they can be located here: /System/Library/Keychains/
f.
Other keychains can be found throughout macOS. You should leave these files alone unless you’re instructed by a trusted source to resolve an issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What app should you use to manage keychain settings?

A

Keychain Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does two-factor authentication provide added security to your Apple ID?

A

With two-factor authentication, your Apple ID account can be accessed only on devices you trust, such as your Apple devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When and why would you use iCloud Security Code?

A

iCloud Security Code is a separate technology used to further protect your secrets in iCloud Keychain.
It is used when you enable iCloud Keychain with an Apple ID without two-factor authentication enabled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which three macOS functions require management of security-sensitive settings and enrollment with User-Approved MDM enrollment?

A

Kernel extension loading policy
Autonomous single-app mode
User consent for data access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In what three ways can you obtain User Approved MDM enrollment?

A

a. Use Apple Business Manager or Apple School Manager to automatically enroll your Mac in an MDM solution. Its enrollment is equivalent to User Approved.
b. Install macOS 10.13.4 or newer. If a Mac was enrolled in non-User Approved MDM before its update to macOS 10.13.4 or newer, it will be converted to a User Approved MDM enrollment.
c. Follow the prompts in System Preferences to enroll in MDM. Download or email yourself an enrollment profile and double-click the enrollment profile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which macOS System-wide and personal settings can you manage in Security and Privacy?

A

a. General settings
b. Advanced Settings
c. FileVault Settings
d. Firewall Settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which feature can you enable to find a lost Mac?

A

Find my Mac

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can you limit the use of Location Services?

A

Use the privacy pane of Security preferences to change location services.
(When a new app requests info that might be personal, macOS requests permission first.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can you ensure that audio recordings used for Dictation service remain private?

A

By using enhanced dictation, does not send any of the text to Apple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which three categories do kernel extensions (KEXTs) typically belong to?

A

a. Low-level device drivers
b. Network filters
c. File system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly