Lesson 9 Flashcards
Manage Security and Privacy
What are the different types of passwords you use to secure a Mac?
a. Local user account—Used to log in to your Mac.
b. Apple ID—For iCloud, iTunes, and the App Store.
c. Keychain—To protect authentication assets in encrypted keychain files.
d. Resource—Such as email, websites, file servers, apps, and encrypted disk images.
e. Firmware—Prevents your Mac from starting up from any disk other than your designated startup disk.
What types of items can you store in a keychain?
Store resource passwords Certificates Keys Website forms Safari AutoFill information Secure text notes.
How does Keychain Access help protect your information?
It manages encrypted files that are used to securely save your items.
Can’t be broken unless password is known.
If forgotten, file contents are gone forever.
Where are keychain files stored?
Are stored in the Library folder under their respective names in the keychains folder.
a. Local login keychains are stored in Keychain/login.keychain.
b. Other local keychains are stored in Keychains/others.keychain.
c. iCloud keychains are stored in Keychains/UUID/.
d. System keychains are stored in /Library/Keychains/System.keychain.
e. System Root keychains for trusted networks do not appear by default, but they can be located here: /System/Library/Keychains/
f.
Other keychains can be found throughout macOS. You should leave these files alone unless you’re instructed by a trusted source to resolve an issue.
What app should you use to manage keychain settings?
Keychain Access
How does two-factor authentication provide added security to your Apple ID?
With two-factor authentication, your Apple ID account can be accessed only on devices you trust, such as your Apple devices.
When and why would you use iCloud Security Code?
iCloud Security Code is a separate technology used to further protect your secrets in iCloud Keychain.
It is used when you enable iCloud Keychain with an Apple ID without two-factor authentication enabled.
Which three macOS functions require management of security-sensitive settings and enrollment with User-Approved MDM enrollment?
Kernel extension loading policy
Autonomous single-app mode
User consent for data access
In what three ways can you obtain User Approved MDM enrollment?
a. Use Apple Business Manager or Apple School Manager to automatically enroll your Mac in an MDM solution. Its enrollment is equivalent to User Approved.
b. Install macOS 10.13.4 or newer. If a Mac was enrolled in non-User Approved MDM before its update to macOS 10.13.4 or newer, it will be converted to a User Approved MDM enrollment.
c. Follow the prompts in System Preferences to enroll in MDM. Download or email yourself an enrollment profile and double-click the enrollment profile.
Which macOS System-wide and personal settings can you manage in Security and Privacy?
a. General settings
b. Advanced Settings
c. FileVault Settings
d. Firewall Settings
Which feature can you enable to find a lost Mac?
Find my Mac
How can you limit the use of Location Services?
Use the privacy pane of Security preferences to change location services.
(When a new app requests info that might be personal, macOS requests permission first.)
How can you ensure that audio recordings used for Dictation service remain private?
By using enhanced dictation, does not send any of the text to Apple
Which three categories do kernel extensions (KEXTs) typically belong to?
a. Low-level device drivers
b. Network filters
c. File system