Lesson 9—Manage Security and Privacy Flashcards

1
Q

What are the 5 different types of passwords you can use to secure a Mac?

A

Local user account password—Used to log in to your Mac
• Apple ID and password—For iCloud, iTunes Store, and the App Store
• Keychain passwords—Protects authentication assets in encrypted keychain files
• Resource passwords—For email, websites, file servers, apps, and encrypted disk images
• Firmware password—Prevents your Intel-based Mac from starting up from any disk other than your designated startup disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What 7 types of items can you store in a keychain?

A

Keychains securely store your resource passwords, certificates, keys, website forms, Safari AutoFill information, and secure text notes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does Keychain Access help protect your information?

A

Keychain Access manages encrypted files that are used to securely save your items. These files are impenetrable unless you know the keychain password. If you forget the keychain password, you lose the file contents forever.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where are keychain files stored?

A

Keychain files are stored throughout macOS for different users and resources:
• A user’s login keychain is stored in /Users/username/Library/Keychain/login.keychain-db.
• Other local keychains are stored in /Users/username/Library/Keychains/others.keychain.
• A user’s Local Items or iCloud keychain (depending on if iCloud keychain is turned on) is stored in
/Users/username/Library/Keychains/UUID/.
• A system keychain with authentication assets that aren’t user specific is stored in
/Library/Keychains/System.keychain. Examples include Wi-Fi wireless network passwords, 802.1X network passwords, self-signed certificates, and intermediate and root certificate authorities (CAs) that you installed.
• Most of the items in /System/Library/Keychains/ don’t appear by default, with the exception of System Roots, which contains root certificates that Apple provides as part of macOS and are used to
identify trusted network services.
• macOS contains other keychains, but you should leave these files alone unless a trusted source instructs you to access them to resolve an issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What app should you use to manage keychain settings?

A

Keychain Access to view and modify most keychain items.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does two-factor authentication provide added security to your Apple ID?

A

With two-factor authentication, your Apple ID account can only be accessed after you approve the sign-in with a device you trust, such as your iPhone, iPad, or Mac.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which macOS systemwide and personal settings can you manage in Security & Privacy preferences?

A
  • General settings—Provides the option to require a password to wake a Mac from sleep or screen saver mode and to define a delay before this requirement sets in. Also allows you to configure a custom message to show at the login window or when the screen is locked.
  • Advanced settings—Provides the option to require users to automatically log out of accounts after a certain amount of inactivity and to require an administrator password to access systemwide preferences.
  • FileVault settings—Provides the option to enable and configure FileVault.
  • Firewall settings—Provides the option to enable and configure personal network firewall settings.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which feature should you use to find a lost Mac?

A

Find My helps you find a lost Mac by allowing you to remotely access the Mac computer’s Location Services service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can you limit the use of Location Services?

A

You can use the Privacy pane of Security & Privacy preferences to configure app access to Location Services, Contacts, Calendars, Reminders, and social network services. When a new app requests information that’s considered personal, macOS asks you for permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can you ensure that audio recordings used for Dictation service remain private?

A

To ensure that your voice recordings remain private, you can manage your Enhanced Dictation settings manually. The Enhanced Dictation option is enabled by default. When you use Enhanced Dictation, your Mac immediately converts what you say into text without sending your dictated speech to Apple. If you turn Enhanced Dictation off or use Siri, what you say and dictate is recorded and sent to Apple to be converted to text. Apple also tracks other information such as your name, nickname, location, and much of the user data sent from your device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the three conditions that must be met before a standard user account can install a legacy
system extension on a Mac with Apple silicon?

A

Before a standard user account can install a legacy system extension on a Mac with Apple silicon the Security Policy for that macOS must be configured with Reduced Security, and the “Allow user management of kernel extensions from identified developers” checkbox must be selected. Additionally, the legacy system extension must be notarized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly